Preferred Language
Articles
/
joe-1181
National Grid Connected 3-Phase Inverter based on Photovoltaic Solar System
...Show More Authors

In this paper, a national grid-connected photovoltaic (PV) system is proposed. It extracts the maximum power point (MPP) using three-incremental-steps perturb and observe (TISP&O) maximum power point tracking (MPPT) method. It improves the classic P&O by using three incremental duty ratio (ΔD) instead of a single one in the conventional P and O MPPT method. Therefore, the system's performance is improved to a higher speed and less power fluctuation around the MPP. The Boost converter controls the MPPT and then is connected to a three-phase voltage source inverter (VSI). This type of inverter needs a high and constant input voltage. A second-order low pass (LC) filter is connected to the output of VSI to reduce the total harmonic distortion (THD) of the output current. The LC filter is then connected to a step-up transformer to push up the low VSI output voltage to the high grid voltage level. The control strategy is based on the rotating reference frame (dq reference frame) and the grid phase shift angle extracted using a phase-locked loop (PLL) technique. The designed PV system supplies only active power with zero reactive power to the utility grid. The system is simulated using MATLAB / Simulink software.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jun 30 2025
Journal Name
Modern Sport
Visual Tracking and its Relationship to Dynamic Visual Acuity Among National Youth Foil Fencing Team Athletes
...Show More Authors

View Publication
Crossref
Publication Date
Thu Jan 24 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Over the awareness of managers strategic importance of vigilance: "Exploratory study in the National Insurance Company"
...Show More Authors

The rapid reality of events in the information era, and the enormous pressure of forces market, competition, permanent movement of the markets and consumers and the large development unprecedented of technology in all areas make a lot of organizations find it difficult to keep up with this rapid developments .Here was the role of strategic vigilance closer organization to their environment ,and play an active role in providing the necessary information to make decisions and insurance companies are not far from those changes .On this basis the researcher offered studied(Over the awareness of managers of insurance companies for strategic vigilance).Choosing sample of 35 managers in the National Insurance Company to test th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Organizational Ambidexterity and its Impact in Achieving Strategic Success: Applied Study in National Bank of Iraq
...Show More Authors

   The subject of the organizational Ambidexterity of the vital Topics through which it seeks organizations to provide mentalities renewable for their members and maintain its survival and continuity according to different organizational methods of access for strategic success.     The research aims to demonstrate the impact of organizational Ambidexterity in achieving strategic success in the National bank of Iraq, and the questionnaire was prepared as a tool for collecting data and information through sample  survey of (16) managers and heads of departments , The results were analyzed by using the statistical program (SPSS) in calculating  mean, standard deviation, percent and test (f), coefficie

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of strategic cohesion in achieving organizational prosperity: Applied research in the National Insurance Company
...Show More Authors

Abstract

                The research aims to shed light on strategic cohesion and its dimensions represented by (strategic logic, organizational excitement, organizational founding, organizational synergy) and measure its impact on achieving organizational prosperity and its dimensions represented by (intellectual capital, innovation, infrastructure, organizational agility, sustainable competitive advantage). The research problem emerged by raising the main question, which is: Does the management of the researched company realize the importance of practicing strategic cohesion and its role in achieving organizational pros

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 29 2023
Journal Name
Journal Of The College Of Education For Women
The Counselor Brent Scowcroft and his Role in Achieving the Requirements of the American National Security
...Show More Authors

       Despite the multiplicity of institutions contributing to the decision-making process in the United States of America, they interact to crystallize positions regarding international and strategic situations. The formulation of the national security policy depends on a number of institutions that complement each other in order to achieve an advanced security situation. Thus, the decision reflects the process of interaction of the existing regulatory institutions. This is because the essence of the national security and achieving its requirements also stems from the existence of a coherent system of shared beliefs and principles in the American society. Besides, these elements are the bases for achieving

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
Specifying Quality of a Tight Oil Reservoir through 3-D Reservoir Modeling
...Show More Authors

Increasing hydrocarbon recovery from tight reservoirs is an essential goal of oil industry in the recent years. Building real dynamic simulation models and selecting and designing suitable development strategies for such reservoirs need basically to construct accurate structural static model construction. The uncertainties in building 3-D reservoir models are a real challenge for such micro to nano pore scale structure. Based on data from 24 wells distributed throughout the Sadi tight formation. An application of building a 3-D static model for a tight limestone oil reservoir in Iraq is presented in this study. The most common uncertainties confronted while building the model were illustrated. Such as accurate estimations of cut-off

... Show More
Crossref (1)
Crossref
Publication Date
Fri Mar 04 2022
Journal Name
Pakistan Journal Of Medical And Health Science
Detection of aadA1 and aac(3)-1V resistance genes in Acinetobacter baumannii
...Show More Authors

Publication Date
Mon Mar 27 2023
Journal Name
Iranian Journal Of Materials Science And Engineering
First-Principles Analysis of Cr-Doped SrTiO 3 Perovskite as Optoelectronic Materials
...Show More Authors

The influence of Cr3+ doping on the ground state properties of SrTiO 3 perovskite was evaluated using GGA-PBE approximation. Computational modeling results infered an agreement with the previously published literature. The modification of electronic structure and optical properties due to Cr3+ introducing into SrTiO 3 were investigated. Structural parameters assumed that Cr3+ doping alters the electronic structures of SrTiO 3 by shifting the conduction band through lower energies for the Sr and Ti sites. Besides, results showed that the band gap was reduced by approximately 50% when presenting one Cr3+ atom into the SrTiO 3 system and particularly positioned at Sr sites. Interestingly, substituting Ti site by Cr3+ led to eliminating the ban

... Show More
Preview PDF