Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreThe rapid breakthrough achieved by technological progress in the field of designing and implementing women's fashion has resulted in the emergence of the need for quality control and control to improve the completed visual image of fashion as an aesthetic and functional product and not clothed in its abstract qualities.
The quality in women’s fashion and the importance of showing the design and conveying the design message to the recipient depends on the level of its implementation, starting from the selection of textile fibers and determining their appropriate characteristics for the functional purpose and design prepared by the designer and ending with the final operations of the costume. This calls for spreading awareness and c
Due to a party's violation of his obligations or responsibilities indicated in the contract, many engineering projects confront extensive contractual disputes, which in turn need arbitration or other forms of dispute resolution, which negatively impact the project's outcome. Each contract has its terms for dispute resolution. Therefore, this paper aims to study the provisions for dispute resolution according to Iraqi (SBDW) and the JCT (SBC/Q2016) and also to show the extent of the difference between the two contracts in the application of these provisions. The methodology includes a detailed study of the dispute settlement provisions for both contracts with a comparative analysis to identify the differences in the appli
... Show MoreA theoretical study including the effects of the fusion characteristics parameters on the fundamental fusion rate for the BEC state in D-D fusion reaction is deal with varieties physical parameters such as the fuels density, fuel temperature and the astrophysics S-factor are processed to bring an approximately a comparable results to agree with the others previously studies.
Prosopis farcta has been used traditionally for several diseases as cardiovascular, kidney, diabetes, bacterial infection and it has diuretic activity. This study was designed to evaluate the diuretic effects of P. farcta extract in comparison with spironolactone and hydrochlorothiazide in normal and hypertensive rats.Forty eight rats, were divided into Two groups. The First group was consist of Twelve normotensive rats, to represent the control group and normal treated group receiving 50 mg/Kg of P. farcta extract; Six rats in each group.
The Second group involved 36 hypertensive rats, were divided into six subgroups, each of six rats. The First subgroups served as a positive control, the Second, Third
... Show MoreThis paper presents a grey model GM(1,1) of the first rank and a variable one and is the basis of the grey system theory , This research dealt properties of grey model and a set of methods to estimate parameters of the grey model GM(1,1) is the least square Method (LS) , weighted least square method (WLS), total least square method (TLS) and gradient descent method (DS). These methods were compared based on two types of standards: Mean square error (MSE), mean absolute percentage error (MAPE), and after comparison using simulation the best method was applied to real data represented by the rate of consumption of the two types of oils a Heavy fuel (HFO) and diesel fuel (D.O) and has been applied several tests to
... Show MoreSensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MoreThe automatic liquid filling system is used in different applications such as production of detergents, liquid soaps, fruit juices, milk products, bottled water, etc. The automatic bottle filling system is highly expensive. Where, the common filling systems required to complex changes in hardware and software in order to modify volume of liquid. There are many important variables in the filling process such as volume of liquid, the filling time, etc. This paper presents a new approach to develop an automatic liquid filling system. The new proposed system consists of a conveyor subsystem, filling stations, and camera to detect the level of the liquid at any instant during the filling process. The camera can detect accurately the leve
... Show MoreThis paper proposes and tests a computerized approach for constructing a 3D model of blood vessels from angiogram images. The approach is divided into two steps, image features extraction and solid model formation. In the first step, image morphological operations and post-processing techniques are used for extracting geometrical entities from the angiogram image. These entities are the middle curve and outer edges of the blood vessel, which are then passed to a computer-aided graphical system for the second phase of processing. The system has embedded programming capabilities and pre-programmed libraries for automating a sequence of events that are exploited to create a solid model of the blood vessel. The gradient of the middle c
... Show More