This paper introduces a Laplace-based modeling approach for the study of transient converter-grid interactions. The proposed approach is based on the development of two-port admittance models of converters and other components, combined with the use of numerical Laplace transforms. The application of a frequency domain method is aimed at the accurate and straightforward computation of transient system responses while preserving the wideband frequency characteristics of power components, such as those due to the use of high frequency semiconductive switches, electromagnetic interaction between inductive and capacitive components, as well as wave propagation and frequency dependence in transmission systems.
Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.
In our work present, the application of strong-Lensing observations for some gravitational lenses have been adopted to study the geometry of the universe and to explain the physics and the size of the quasars. The first procedure was to study the geometrical of the Lensing system to determine the relation between the redshift of the gravitational observations with its distances. The second procedure was to compare between the angular diameter distances "DA" calculated from the Euclidean case with that from the Freedman models, then evaluating the diameter of the system lens. The results concluded that the phenomena are restricted to the ratio of distance between lens and source with the diameter of the lens noticing.
The population density of the insect on Alorat and fruits located in the lower part of the tree more than the middle part of the plant and insect in one place and demonstrates that there is a nest there were conducted laboratory and field studies on citrus Hsasahanwaa and the Alvdaúaa distribution of cortical insect yellow ....
Density Functional Theory (DFT) calculations were carried out to study the thermal cracking for acenaphthylene molecule to estimate the bond energies for breaking C8b-C5a , C5a-C5 , C5-C4 , and C5-H5 bonds as well as the activation energies. It was found that for C8b-C5a , C5-C4 , and C5-H5 reactions it is often possible to identify one pathway for bond breakage through the singlet or triplet states. The atomic charges , dipole moment and nuclear – nuclear repulsion energy supported the breakage bond .Also, it was found that the activation energy value for C5-H5 bond breakage is lower than that required for C8b-C5a , C5a-C5 , C5-C4 bonds which refer to C5-H5 bond in acenaphthylene molecule are weaker than C8b-C5a , C5a-C5 , C5-C
... Show MoreThe survey showed sample opinions of officials in the general company for vegetable oils industry, and the statement of the order of the effect of these dimensions depending on the degree of importance, the questionnaire was used as a key tool in collecting data and information of the sample consisted of 30 officials, arithmetic mean, standard deviation, percentages, Spearman correlation coefficient and the global statistical analysis as a statistical methods that based on statistical program (SPSS), The researcher came to several conclusions, most important that there is high agreement by the respondents of the importance of the dimensions of building a mental picture of the company and to attract the consumer's attention, Also research
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreThis paper predicts the resilient modulus (Mr) for warm mix asphalt (WMA) mixtures prepared using aspha-min. Various predictor variables were analyzed, including asphalt cement types, asphalt contents, nominal maximum aggregate sizes (NMAS), filler content, test temperatures, and loading times. Univariate and multivariate analyses were conducted to examine the behavior of each predictor variable individually and collectively. Through univariate analysis, it was observed that Mr exhibited an inverse trend with asphalt cement grade, NMAS, test temperature, and load duration. Although Mr increased slightly with higher filler and asphalt content, the magnitude of this increase was minimal. Multivariate analysis revealed that the rate of change
... Show MoreApplications of quantitative methods, which had been explicit attention during previous period (the last two centuries) is the method of application sales man or traveling salesman method. According to this interest by the actual need for a lot of the production sectors and companies that distribute their products, whether locally made or the imported for customers or other industry sectors where most of the productive sectors and companies distributed always aspired to (increase profits, imports, the production quantity, quantity of exports. etc. ...) this is the part of the other hand, want to behave during the process of distribution routes that achieve the best or the least or most appropriate.
... Show MoreA field study investigated the degree of need for managers working in the directories of education to develop their skills for the exercise of administrative empowerment, and it adopted the descriptive analytical approach. The research community, was determined which consisted of 126 principals, and the sample was selected with arte of randomly Statistics and by (100%) of the research community, as the number of respondents was (126) of managers working in the directories of education. A questionnaire was built which included 40 items distributed among the fields of study. Researchers verified its validity and reliability. The research data were analyzed using software (SPSS), the questionnaire was applied in the second semester of the a
... Show More