Preferred Language
Articles
/
ijs-5877
The Numerical Analysis for Electrical Streamer Discharge Behaviour in Transformer Oil
...Show More Authors

      In this paper, a numerical analysis was carried out using finite element method to analyse the mechanisms for streamer discharges. The hydrodynamic model was used with three charge carriers equations (positive ion, negative ion and electron) coupled with Poisson equation to simulate the dynamic of streamer discharge formation and propagation. The model was tested within a 2D axisymmetric tip-plate electrodes configuration using the transformer oil as the dielectric liquid. The distance between the electrodes was fixed at 1 mm and the applied voltage was 130 kV at 46 ns rising time. Simulation results showed that the time has a clear effect on the streamer propagation along the symmetry axis. In addition, it was observed that the highest value of the voltage was recorded at 46 ns and the minimum voltage required for insulation breakdown was 112 kV at 200 ns. It was revealed that the streamer velocity recorded the highest value when the streamer reaches the plate electrode and the lowest value when the streamer begins to propagate. Results also showed that the streamer discharge was dominated by positive ions while the negative ions have a low effect.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 28 2020
Journal Name
Iraqi Journal Of Science
De-Noising of Corrupted Fluoroscopy Images Based on a New Multi-Line Algorithm
...Show More Authors

 Fluoroscopic images are a field of medical images that depends on the quality of image for correct diagnosis; the main trouble is the de-nosing and how to keep the poise between degradation of noisy image, from one side, and edge and fine details preservation, from the other side, especially when fluoroscopic images contain black and white type noise with high density. The previous filters could usually handle low/medium black and white type noise densities, that expense edge, =fine details preservation and fail with high density of noise that corrupts the images. Therefore, this paper proposed a new Multi-Line algorithm that deals with high-corrupted image with high density of black and white type noise. The experiments achieved i

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Mar 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Semi-Essential Submodules
...Show More Authors

Let R be a commutative ring with identity and let M be a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of semi-essential submodules which introduced by Ali S. Mijbass and Nada K. Abdullah, and we make simple changes to the definition relate with the zero submodule, so we say that a submodule N of an R-module M is called semi-essential, if whenever N ∩ P = (0), then P = (0) for each prime submodule P of M. Various properties of semi-essential submodules are considered.

View Publication Preview PDF
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
A Generalized Integral of Shilkret and Choquet Integrals
...Show More Authors

In this paper we introduced a new type of integrals based on binary element sets “a generalized integral of Shilkret and Choquet integrals” that combined the two kinds of aggregation functions which are Shilkret and Choquet integrals. Then, we gave some properties of that integral. Finally, we illustrated our integral in a numerical example.
.

View Publication Preview PDF
Publication Date
Mon Apr 06 2020
Journal Name
August
INFLUENCE OF SOME FACTOR ON SOMATIC EMBRYOS INDUCTION AND GERMINATION OF DATE PALM CV BARHI BY USING CELL SUSPENSION CULTURE TECHNIQUE
...Show More Authors

View Publication
Publication Date
Thu Jan 21 2021
Journal Name
Recent Innovations In Chemical Engineering (formerly Recent Patents On Chemical Engineering)
Soap Production Using Vacuum Reactive Distillation: Batch Model
...Show More Authors

Introduction: Although soap industry is known from hundreds of years, the development accompanied with this industry was little. The development implied the mechanical equipment and the additive materials necessary to produce soap with the best specifications of shape, physical and chemical properties. Objectives: This research studies the use of vacuum reactive distillation VRD technique for soap production. Methods: Olein and Palmitin in the ratio of 3 to 1 were mixed in a flask with NaOH solution in stoichiometric amount under different vacuum pressures from -0.35 to -0.5 bar. Total conversion was reached by using the VRD technique. The soap produced by the VRD method was compared with soap prepared by the reaction - only method which

... Show More
View Publication
Scopus Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed A Permutation and Substitution Methods of Serpent Block Cipher
...Show More Authors

     Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Authentication of Digital Video Encryption
...Show More Authors

The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Fully Prime Semimodule, Fully Essential Semimodule and Semi-Complement Subsemimodules
...Show More Authors

      The concept of semi-essential semimodule has been studied by many researchers.

     In this paper, we will develop these results by setting appropriate conditions, and defining new properties, relating to our concept, for example (fully prime semimodule, fully essential semimodule and semi-complement subsemimodule) such that: if for each subsemimodule of -semimodule  is prime, then  is fully prime. If every semi-essential subsemimodule of -semimodule  is essential then  is fully essential. Finally, a prime subsemimodule  of  is called semi-relative intersection complement (briefly, semi-complement) of subsemimodule  in , if , and whenever  with  is a prime subsemimodule in , , then .  Furthermore, some res

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Extend Nearly Pseudo Quasi-2-Absorbing submodules(I)
...Show More Authors

The concept of a 2-Absorbing submodule is considered as an essential feature in the field of module theory and has many generalizations. This articale discusses the concept of the Extend Nearly Pseudo Quasi-2-Absorbing submodules and their relationship to the 2-Absorbing submodule, Quasi-2-Absorbing submodule, Nearly-2-Absorbing submodule, Pseudo-2-Absorbing submodule, and the rest of the other concepts previously studied. The relationship between them has been studied, explaining that the opposite is not true and that under certain conditions the opposite becomes true. This article aims to study this concept and gives the most important propositions, characterizations, remarks, examples, lemmas, and observations related to it. In the en

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 03 2016
Journal Name
Iraqi Medical Journal
EVALUATION OF PATIENTS WITH CARPAL TUNNEL SYNDROME TREATED BY MINIMAL PALMAR INCISION (A PRELIMINARY STUDY)
...Show More Authors

Background : Carpal tunnel syndrome (CTS) is the most common entrapment neuropathy of upper extremities and Open carpal tunnel release is the most frequent surgical procedure and the gold standard for cases that do not respond to conservative treatment. Aims :This study is used to evaluate the functional outcome of limited palmar mini-incision of carpal tunnel release. This study aims to determine the safety and symptomatic and functional efficacy of median nerve decompression with limited incision in carpal tunnel syndrome surgery. Patients and methods:Carpal tunnel release with a 1.5-2 cm limited palmar incision was performed on 20 patients. Patients were evaluated initially at one month after treatment according to symptom severity

... Show More
View Publication Preview PDF