
The applications of Multilevel Converter (MLC) are increased because of the huge demand for clean power; especially these types of converters are compatible with the renewable energy sources. In addition, these new types of converters have the capability of high voltage and high power operation. A Nine-level converter in three modes of implementation; Diode Clamped-MLC (DC-MLC), Capacitor Clamped-MLC (CC-MLC), and the Modular Structured-MLC (MS-MLC) are analyzed and simulated in this paper. Various types of Multicarrier Modulation Techniques (MMTs) (Level shifted (LS), and Phase shifted (PS)) are used for operating the proposed Nine level - MLCs. Matlab/Simulink environment is used for the simulation, extracting, and ana
... Show MoreEthanol as a solvent, a precursor of titanium isopropoxide and a stabilizer of either hydrochloric acid or ammonium hydroxide was used to prepare a titanium dioxide aqueous solution. The aqueous solutions with different values of pH and the morphology of the resultant reaction of the nanoparticles of titanium dioxide were investigated. The X-ray diffraction showed that at low temperatures and with acidic solutions, rutile structures are more favorable to grow on titanium dioxide synthesized, while at low and average temperatures and with base solutions, anatase phase is more pronounced. The crystalline form and the re-confirmation of the crystallite size growth were observed by the scanning electron microscopy. The atomi
... Show MoreFG Mohammed, HM Al-Dabbas, Iraqi journal of science, 2018 - Cited by 6
In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreThe fauna of bees (Hymenoptera, Apoidea) from different regions of Iraq is surveyed in this study; there were 16 species, 13 genera that belong to four families which are collected in this investigation.
Also, all the species that are recorded for Iraq in previous investigations are revised; totally there are 110 species, 32 genera belonging to five families: Apidae, Andernidae, Colletidae, Halictidae and Megachilidae were listed.
Background: Denture lining materials are widely used in prosthodontic treatment and management of traumatized oral mucosa. A contaminated prosthesis can provide a source of cross-contamination between patients and dental personnel as well as a cause for denture stomatitis. Therefore, denture disinfection has been recommended as an essential procedure for maintenance of a healthy oral mucosa. This study investigated the effect of SOLO disinfectant solution on some properties of different denture lining materials. Materials and methods: Three different solutions were used in this study; SOLO disinfectant solution, sodium hypochlorite solution, and water on three types of acrylic denture lining materials; hot cure, cold cure, and soft acrylic
... Show MoreThis paper demonstrates an experimental and numerical study aimed to compare the influence of openings of different configurations on the flexural behavior of prestressed concrete rafters. The experimental program consisted of testing six simply supported prestressed concrete rafters; 5 rafters are perforated, and the other one is solid as a reference. All rafters were tested under monotonic midpoint load. The variable which has been investigated in this work was the opening’s configuration (quadrilateral or circular) with the same upper and lower chords depths. The results indicate improvement in the beam flexural behavior using the circular openings compared to the quadrilateral o
This research aims at calculating the optimum cutting condition for various types of machining methods, assisted by computers, (the computer program in this research is designed to solve linear programs; the program is written in v. basic language). The program obtains the results automatically, this occur through entering the preliminary information about the work piece and the operating condition, the program makes the calculation actually by solving a group of experimental relations, depending on the type of machining method (turning, milling, drilling). The program was transferred to package and group of windows to facilitate the use; it will automatically print the initial input and optimal solution, and thus reduce the effort and t
... Show More
