Preferred Language
Articles
/
alkej-349
Simulation Model of Wind Turbine Power Control System with Fuzzy Regulation by Mamdani and Larsen Algorithms
...Show More Authors

Abstract 

     The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of  the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineering and renewable energy concepts.

     A comparison was done to access the functionality of  the developed power control system of fuzzy logic and classical control system with PID – control. It can be concluded that the power control system of fuzzy logic allows to accurately maintain production under the control target function for each work area. When switching operation of wind turbines, it has the distinction that from 13.5 m/s  to another wind velocity value, there is no overshoot  and a typical of classical control systems, and when the wind velocity V is less than13.5 m / s, the pitch angle of the blades should be slightly greater than zero, and if it has increased by 5 °, then blade length should be minimal as possible. Simulation program proved the possibility of effective power regulation for the large wind turbines controller fuzzy type on the basis of knowledge production "if - then" rules, which were shown to be effective on these wind turbines control.

 Keywords: Mamdani and Larsen algorithms fuzzy inference, Matlab Fuzzy Logic ,Fuzzy-PID controllers, Wind turbine.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Sun Mar 06 2011
Journal Name
Baghdad Science Journal
Age,Growth and Reproduction of Zebra Mussel, Dreissena polymorpha in Al-Musayab Thermal Power Plant, Iraq
...Show More Authors

Some biological aspects of the zebra mussel, Dreissena polymorpha have been studied at Al-Musayab thermal power plant ,sixty km. south west of Baghdad. Data collected during the period extended from November, 2002 to October, 2003 except for the month of April The population consisted of five age groups; O, I, II, III, and IV which have 0, 1, 2, 3 and 4 annuli respectively. The study also proved the validity of annuli readings for age and growth determination. The average annual growth rates for age groups O,I, II, III, and IV were 5.7, 5.5, 5.4, 5.2 and 5.4 respectively. Average calculated length for laboratory reared mussel was 2.5 mm compared to 5.4 mm in natural environment. Correlation coefficients were very high between age an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Saudi Medical Journal
The diagnostic power of circulating micro ribonucleic acid 34a in combination with cancer antigen 15-3 as a potential biomarker of breast cancer
...Show More Authors

View Publication
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Solutions and Recent Challenges Related to Energy in Wireless Body Area Networks with Integrated Technologies: Applications and Perspectives
...Show More Authors

          In this paper, we have investigated some of the most recent energy efficient routing protocols for wireless body area networks. This technology has seen advancements in recent times where wireless sensors are injected in the human body to sense and measure body parameters like temperature, heartbeat and glucose level. These tiny wireless sensors gather body data information and send it over a wireless network to the base station. The data measurements are examined by the doctor or   physician and the suitable cure is suggested. The whole communication is done through routing protocols in a network environment. Routing protocol consumes energy while helping non-stop communic

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Phenol Content and Peroxidase Enzyme Activity in Soybean Infected with Xanthomonas axonopodis pv glycines with the Application of Bacillus subtilis JB12 and Bacillus velezensis ST32
...Show More Authors

Xanthomonas axonopodis pv glycines (Xag) is a pathogen that causes pustule disease in soybeans. Many
techniques for controlling this disease have been widely developed, one of which is the use of biological agents.
Bacillus sp. from the soybean phyllosphere is a biological agent that has the potential to suppress the
development of pustule disease. One of the biological control mechanisms is through biochemical induction
of plant resistance which includes the accumulation of phenols, salicylic acid compounds, and peroxidase
enzymes. Bacillus subtilis JB12 and Bacillus velezensis ST32 are two bacteria isolated from the soybean
phyllosphere which have previously been known to suppress Xag through an anti

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Nov 15 2021
Journal Name
Aip Conference Proceedings
Oil skimming followed by coagulation/flocculation processes for oilfield produced water treatment and zero liquid discharge system application
...Show More Authors

The study focused on the treatment of real oilfield produced water from the East Baghdad field affiliated to the Midland Oil Company (Iraq) using an oil skimming process followed by a coagulation/flocculation process for zero liquid discharge system applications. Belt type oil skimmer was utilized for evaluating the process efficiency with various operating conditions such as temperature (17-40 °C) and time (0.5-2.5 hr.). Polyaluminum chloride (PAC) coagulant and polyacrylamide (PAM) flocculant was used to investigate the performance of the coagulation/flocculation process with PAC dosage (5-90 ppm) and pH (5-10) as operating conditions. In the skimming process, the oil content, COD, turbidity, and TSS decreased with an increase in tempera

... Show More
View Publication
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
THE THERMOELECTRLC POWER OF THE MAGNETLC Fe-Mn-Al COMPOUNDS
...Show More Authors

The thermoelectric power as a function of temperature for the Iron-Manganese-Aluminum, Fe-Mn-Al, alloys for manganese concentrations 0.04, 0.06, 0.08, 0.10 and 0.20 have been investigated in the temperature range 300 K. to 500 K. these results showed that the thermoelectric power coefficient in hot probe measurements showed that the electrons are the majority charge carriers in these alloys.

View Publication Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Power Generation from Utilizing Thermal Energy of Hazardous Waste Incinerators
...Show More Authors

A large amount of thermal energy is generated from burning hazardous chemical wastes, and the temperature of the flue gases in hazardous waste incinerators reaches up to (1200 °C). The flue gases are cooled to (40°C) and are treated before emission. This thermal energy can be utilized to produce electrical power by designing a system suitable for dangerous flue gases in the future depending on the results of much research about using a proto-type small steam power plant that uses safe fuel to study and develop the electricity generation process with water tube boiler which is manufactured experimentally with theoretical development for some of its parts which are inefficient in experimental work. The studied system gen

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jul 01 2013
Journal Name
Political Sciences Journal
Chinese power challenge of becoming historical sites in the course
...Show More Authors

China occupies an area of 906 million square km. and lies east Asia. Its population approximately 1,388 people, according to census 2010. China was a global great power for centuries , then shrank its jurisdiction and occupied by European countries and Japan in the 19th century. It regained its strength and independence under the leadership and rule of the Chinese Communist Party since 1949. In the 21st century , the Chinese positions has risen universally due to its achievements in the economic and trade affairs . Nowadays, China became a largest exporting state in the world and a second economic power after USA.

View Publication Preview PDF
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref