The Electrical power system has become vast and more complex, so it is subjected to sudden changes in load levels. Stability is an important concept which determines the stable operation of the power system. Transient stability analysis has become one of the significant studies in the power system to ensure the system stability to withstand a considerable disturbance. The effect of temporary occurrence can lead to malfunction of electronic control equipment. The application of flexible AC transmission systems (FACTS) devices in the transmission system have introduced several changes in the power system. These changes have a significant impact on the power system protection, due to differences inline impedance, line current and voltage. On the distance relaying protection system to identify essential issues that protection engineers need to consider during the stages of design and operation of the protection system. Transient analysis can be conducted using a simulation software package. One of the commercial simulation software package used by industry worldwide is Siemens Power System Simulation for Engineering (PSS/E). The object of this work is to improve the Transient stability and to clear critical fault times of the Kurdistan Region Government (KRG) network by using optimal FACTS devices in different optimal locations under fault conditions.
The research is a special case of semantics modern Iraqi art, especially with regard to the art of sculpture, and the exact Nasba sculpture, has included research, four chapters on whale1. The first chapter: which consisted of:A. The research problem.B. The importance of research.C. Find goal.H. Find borders.Kh. Determine the terms.2. Chapter II: The theoretical framework: which consisted ofA. The first topic: sculptured configuration.B. The second topic:1. The first axis: contemporary Iraqi sculpture.2. The second axis: the sculptor Jawad Salim.3. The third axis: Mohammed sculptor debateC. Theoretical framework indicators.D. Previous studies.3. Chapter III: proceedings: which included:A. Find community.B. The research sample.C. Research
... Show MoreThe present work considers an alternative solution for a complex configuration of rotor discs by applying Galerkin Method. The theoretical model consists of elastic shaft carrying number of discs and supported on number of journal bearings. The equation of motion was discretized to finite degree of freedom in terms of the system generalized coordinates. The various effects of the dynamical forces and moments arising from the bearing, discs and shaft were included. Rayleigh beam model is used for analyzing the shaft while the discs are considered rigid . The validity and convergence of the present analysis was carefully checked by comparing with the Finite Element solution. An example of rotor consists of three different size discs and su
... Show MoreFading channel modeling is generally defined as the variation of the attenuation of a signal with various variables. Time, geographical position, and radio frequency which is included. Fading is often modeled as a random process. Thus, a fading channel is a communication channel that experiences fading. In this paper, the proposed system presents a new design and simulate a wireless channel using Rayleigh channels. Rayleigh channels using two approaches (flat and frequency-selective fading channels) in order to calculate some path space loss efforts and analysis the performance of different wireless fading channel modeling. The results show that the bite error rate (BER) performance is dramatically improved in the value of signal to
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show More
... Show MoreThe reducing of erosion and the solubility of irrigation canals soils which constructed on gypsum soil is important in civil and water resources engineering. The main problem of gypsum soils is the presence of gypsum which represents one of most complex engineering problems, especially when accompanied by the moving of water which represent dynamic load along the canal. There are several solutions to this problem, in this research “Poly urethane” is used to give the gypsum soil sufficient hardness to reduce the solubility and erosion, after compacting the soil in the canal, percentages of Poly urethane was used to making cover to the soil by mixing percent of soil with Poly urethane, and the ratio was as follows: (5 and 10) % an
... Show MoreMobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing, communication, networking, and cloud computing. It can be used in monitoring, health care and smart cities. The most suitable infrastructure for IoT application is wireless sensor networks. One of the main defiance of WSNs is the power limitation of the sensor node. Clustering model is an actual way to eliminate the inspired power during the transmission of the sensed data to a central point called a Base Station (BS). In this paper, efficient clustering protocols are offered to prolong network lifetime. A kern
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreReduce the required time for measuring the permeability of clayey soils by using new manufactured cell