<span lang="EN-US">Proper employment of Hybrid Wind/ PV system is often implemented near the load, and it is linked with the grid to study dynamic stability analysis. Generally, instability is because of sudden load demand variant and variant in renewable sources generation. As well as, weather variation creates several factors that affect the operation of the integrated hybrid system. So this paper introduces output result of a PV /wind via power electronic technique; DC chopper; that is linked to Iraqi power system to promote the facilitating achievement of Wind/ PV voltage. Moreover, PSS/E is used to study dynamic power stability for hybrid system which is attached to an effective region of Iraqi Network. The hybrid system is connected to Amara Old bus and fault bus is achieved to that bus and the stability results reflects that settling time after disturbance is not satisfactory. But, it is found that PV/wind generation system influences Iraqi grid stability to be better than that with only PV generation and the latter is better than stability of the grid that is enhanced with only wind generation. These results represent an important guideline for Iraqi power system planner.</span>
The study aims to find out the extent to which several Iraqi institutional accreditation standards (governance and administration, scientific research, curricula) are applied in two public universities (Baghdad and Middle Technical University) and two private universities (Uruk and Al-Mansour College) by diagnosing strengths and weaknesses and proposing a mechanism and procedures to help educational institution aims to reduce or eliminate the gap. The study stems from the extent of application of several Iraqi institutional accreditation standards represented as it was worked on through observation and field coexistence to reach scientific and practical facts. The method of case study and comparison betwe
... Show MorePurpose: The research aims to determine the relationship between E-Learning and Total Quality Management (TQM) in Educational institutions in Nineveh Governorates.
Methodology / Design: The researchers distributed (30) questionnaires to employees (teachers and administrators) of Nineveh Governorate education who represent the community of the research sample, as they were analyzed using the SPSS V.20
The importance of research: The importance of the research in the fact that it focuses on one of the educational methods represented in integrating the traditional method and relying on modern technologies using computers and the Internet in the field of education to improve the reali
... Show MoreA new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever
... Show MoreD-mannose sugar was used to prepare [benzoic acid 6-formyl-2,2-dimethyl-tetrahydrofuro[3,4-d][1,3]dioxol-4-yl ester] (compound A). The condensation reaction of folic acid with (compound A) resulted in the formation of new ligand [L]. These compounds were characterized by elemental analysis CHN, atomic absorption A.A, (FT-I.R.), (U.V.-Vis), TLC, E.S. mass (for electrospray), molar conductance, and melting point. The new tetradentate ligand [L], reacted with two moles of some selected metal ions and two moles of (2-aminophenol), (metal : ligand : 2-aminophenol) at reflux in water medium to give a series of new complexes of the general formula K2[M2(L)(HA)2] where M= Co(II), Ni(II), Cu(II) an
... Show MoreIn general, path-planning problem is one of most important task in the field of robotics. This paper describes the path-planning problem of mobile robot based on various metaheuristic algorithms. The suitable collision free path of a robot must satisfies certain optimization criteria such as feasibility, minimum path length, safety and smoothness and so on. In this research, various three approaches namely, PSO, Firefly and proposed hybrid FFCPSO are applied in static, known environment to solve the global path-planning problem in three cases. The first case used single mobile robot, the second case used three independent mobile robots and the third case applied three follow up mobile robot. Simulation results, whi
... Show MoreIn the present study, synthesis of bis Schiff base [I, II] by reaction of one mole of terephthalaldehyde with two mole of 2-amino-5-mercapto-1,3,4-thiadiazole or 4-amino benzene thiol in the ethanol absolute, then compounds [I,II] were reacted with Na2CO3 of distilled H2O, then chloroacetic acid was added to yield compounds [III,IV]. O-chitosan derivatives [V,VI] were synthesized by reaction of chitosan with compounds [III,IV] in acidic media in distilled water according to the steps of Fischer. O–chitosan (grafted chitosan) [V,VI] was blended with synthetic polymer polyvinyl alcohol (PVA) to produce polymers [VII,VIII], then these polymers were blended with nano: Gold or Silver by u
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show More