Nowadays power systems are huge networks that consist of electrical energy sources, static and lumped load components, connected over long distances by A.C. transmission lines. Voltage improvement is an important aspect of the power system. If the issue is not dealt with properly, may lead to voltage collapse. In this paper, HVDC links/bipolar connections were inserted in a power system in order to improve the voltage profile. The load flow was simulated by Electrical Transient Analyzer Program (ETAP.16) program in which Newton- Raphson method is used. The load flow simulation studies show a significant enhancement of the power system performance after applying HVDC links on Kurdistan power systems. The bus voltages are significantly increased after connecting High Voltage Direct Current.
The approach of the research is to simulate residual chlorine decay through potable water distribution networks of Gukookcity. EPANET software was used for estimating and predicting chlorine concentration at different water network points . Data requiredas program inputs (pipe properties) were taken from the Baghdad Municipality, factors that affect residual chlorine concentrationincluding (pH ,Temperature, pressure ,flow rate) were measured .Twenty five samples were tested from November 2016 to July 2017.The residual chlorine values varied between ( 0.2-2mg/L) , and pH values varied between (7.6 -8.2) and the pressure was very weak inthis region. Statistical analyses were used to evaluated errors. The calculated concentrations by the calib
... Show MoreOxidation of sulfur compounds in fuel followed by an adsorption process were studied using two modes of operation, batch mode and continuous mode (fixed bed). In batch experiment oxidation process of kerosene with sulfur content 2360 ppm was achieved to study the effect of amount of hydrogen peroxide(2.5, 4, 6 and 10) ml at different temperature(40, 60 and 70)°C. Also the effect of amount acetic acid was studied at the optimal conditions of the oxidation step(4ml H2O2 and 60 °C).Besides, the role of acetic acid different temperatures(40, 60, 70) °C and 4ml H2O2, effect of reaction time(5, 30, 60, 120, 300) minutes at temperatures(40,60) °C, 4ml H2O2 and 1 mlHAC)&
... Show MoreWater hyacinth (Eichhornia crassipes) is a free-floating plant, growing plentifully in the tropical water bodies. It is being speculated that the large biomass can be used in wastewater treatment, heavy steel and dye remediation, as a substrate for bioethanol and biogas production, electrical energy generation, industrial uses, human food and antioxidants, medicines, feed, agriculture, and sustainable improvement. In this work, the adsorption of Congo Red (CR) from aqueous solution onto EC biomass was investigated through a series of batch experiments. The effects of operating parameters such as pH (3-9), dosage (0.1-0.9 g. /100 ml), agitated velocity (100-300), size particle (88-353μm), temperature (10-50˚C), initial dye
... Show MoreData mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreText based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.
... Show MoreSolar photovoltaic (PV) system has emerged as one of the most promising technology to generate clean energy. In this work, the performance of monocrystalline silicon photovoltaic module is studied through observing the effect of necessary parameters: solar irradiation and ambient temperature. The single diode model with series resistors is selected to find the characterization of current-voltage (I-V) and power-voltage (P-V) curves by determining the values of five parameters ( ). This model shows a high accuracy in modeling the solar PV module under various weather conditions. The modeling is simulated via using MATLAB/Simulink software. The performance of the selected solar PV module is tested experimentally for differ
... Show MoreBackground: Powerlifters and bodybuilders use anabolic androgenic steroids (AAS) especially – as many as 55 percent of elite powerlifters admitted using these agents. In contrast to numerous documented toxic and hormonal effects of AAS their impact on the structure and function of the left ventricular (LV) was not yet fully understood.
Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no
... Show More