<span lang="EN-US">Proper employment of Hybrid Wind/ PV system is often implemented near the load, and it is linked with the grid to study dynamic stability analysis. Generally, instability is because of sudden load demand variant and variant in renewable sources generation. As well as, weather variation creates several factors that affect the operation of the integrated hybrid system. So this paper introduces output result of a PV /wind via power electronic technique; DC chopper; that is linked to Iraqi power system to promote the facilitating achievement of Wind/ PV voltage. Moreover, PSS/E is used to study dynamic power stability for hybrid system which is attached to an effective region of Iraqi Network. The hybrid system is connected to Amara Old bus and fault bus is achieved to that bus and the stability results reflects that settling time after disturbance is not satisfactory. But, it is found that PV/wind generation system influences Iraqi grid stability to be better than that with only PV generation and the latter is better than stability of the grid that is enhanced with only wind generation. These results represent an important guideline for Iraqi power system planner.</span>
The plant Abrus precatorius, which belong to Leguminosae (Fabaceae) family and known as Crab’s eyes, Rosary pea with characteristic red and black seeds. It was used in folk medicine in India, China and East Asian countries for treatment of various diseases.
The plant was extracted by '' general method of extraction'' (Harborne, 1973) using 80% aqueous ethanol as a solvent of extraction by soxhlet apparatus. Preliminary qualitative phytochemical screening were performed on the crude ethanolic extract and revealed the presence of alkaloids, flavonoids ,terpenoids and phytosterols in Iraqi Abrus pr
... Show MoreWithin connected speech, RP speakers tend to shorten stressed long vowels end diphthongs in pre. Forties consonants in the same syllable on the basis of complementary Distribution, i.e., the phonological environment decides the influence of the forties plosives and fricatives, as far as they are in find position preceded by stressed long vowels and diphthongs, or particular voiced consonants plus vowels. The Iraqi learners, then, face.
The aim of the research is to assess the quality of the university accounting education system in Iraq. The researcher relied on the opinions of a sample of academics specialized in this field by preparing a checklist focusing on a set of axes that would affect the quality of accounting education in the Iraqi environment.
The most prominent finding of the research is that the quality of accounting education in Iraqi universities is medium and differs from one university to another in some quality components. In addition, the prescribed curricula and study plans applied in the accounting departments do not live up to the required level, as the largest proportion of those curricula are theoretically d
... Show MoreBackground: Practicing self-medication is common and a worrisome issue because of irrational drug use. This study aimed to evaluate self-medication knowledge and views among the final year pharmacy students in Iraq. Methods: A cross-sectional descriptive study was conducted from December 2018 to January 2019. A pre-validated and self-administered questionnaire was recruited to survey pharmacy students at the University of Baghdad and Al-Rafedain University College. The Statistical Package for the Social Sciences version 20 (SPSS v. 20) software used to save and analyze the data. Results expressed as numbers and percentages. Results: A total of 344 students (response rate: 94.24%) with a mean age of 22.10 years includ
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre
... Show More