Preferred Language
Articles
/
joe-1784
Fault Location of Doukan-Erbil 132kv Double Transmission Lines Using Artificial Neural Network ANN
...Show More Authors

Transmission lines are generally subjected to faults, so it is advantageous to determine these faults as quickly as possible. This study uses an Artificial Neural Network technique to locate a fault as soon as it happens on the Doukan-Erbil of 132kv double Transmission lines network. CYME 7.1-Programming/Simulink utilized simulation to model the suggested network. A multilayer perceptron feed-forward artificial neural network with a back propagation learning algorithm is used for the intelligence locator's training, testing, assessment, and validation. Voltages and currents were applied as inputs during the neural network's training. The pre-fault and post-fault values determined the scaled values. The neural network's performance was evaluated, and tests were run. Line-to-ground faults were examined. The study demonstrates how effective, rapid, and precise this method is at locating faults. The neural network's performance was examined, and tests were run on it. The overall performance of the mean square error in the trained network execution was 0.11792 at 35 epochs. The correlation coefficient at the entire target was 0.99987 percent of an error on the Doukan-Erbil double transmission lines.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 31 2000
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Adsorption of NO2/N2O4 into Water and Dilute Nitric Acid in a Double Stirrer Adsorber
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Alexandria Engineering Journal
Calcium/iron-layered double hydroxides-sodium alginate for removal of tetracycline antibiotic from aqueous solution
...Show More Authors

Crossref (19)
Crossref
Publication Date
Thu Jan 23 2020
Journal Name
Acoustics Australia
Absorption Coefficient of a Double-Layer Inhomogeneous Micro-perforated Panel Backed with Multiple Cavity Depths
...Show More Authors

Double-layer micro-perforated panels (MPPs) have been studied extensively as sound absorption systems to increase the absorption performance of single-layer MPPs. However, existing proposed models indicate that there is still room for improvement regarding the frequency bands of absorption for the double-layer MPP. This study presents a double-layer MPP formed with two single MPPs with inhomogeneous perforation backed by multiple cavities of varying depths. The theoretical formulation is developed using the electrical equivalent circuit method to calculate the absorption coefficient under a normal incident sound. The simulation results show that the proposed model can produce absorption coefficient with wider absorption bandwidth compared w

... Show More
View Publication
Scopus (15)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Thu Jan 23 2025
Journal Name
Al-khwarizmi Engineering Journal
Numerical Analysis of Double Diffusive Laminar Natural Convection in a Right Angle Triangular Solar Collector
...Show More Authors

Publication Date
Wed Jan 01 2020
Journal Name
Energy Conversion And Management
Improved PCM melting in a thermal energy storage system of double-pipe helical-coil tube
...Show More Authors

View Publication
Scopus (126)
Crossref (112)
Scopus Clarivate Crossref
Publication Date
Tue Dec 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Numerical Analysis of Double Diffusive Laminar Natural Convection in a Right Angle Triangular Solar Collector
...Show More Authors

A numerical study of the double-diffusive laminar natural convection in a right triangular solar collector has been investigated in present work. The base (absorber) and glass cover of the collector are isothermal and isoconcentration surfaces, while the vertical wall is considered adiabatic and impermeable. Both aiding and opposing buoyancy forces have been studied. Governing equations in vorticity-stream function form are discretized via finite-difference method and are solved numerically by iterative successive under relaxation (SUR) technique. Computer code for MATLAB software has been developed and written to solve mathematical model. Results in the form of streamlines, isotherms, isoconcentration, average Nusselt, and average Sherw

... Show More
View Publication Preview PDF
Publication Date
Fri May 01 2020
Journal Name
International Journal Of Advanced Science And Technology
Improved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval
...Show More Authors

Background/Objectives: The purpose of current research aims to a modified image representation framework for Content-Based Image Retrieval (CBIR) through gray scale input image, Zernike Moments (ZMs) properties, Local Binary Pattern (LBP), Y Color Space, Slantlet Transform (SLT), and Discrete Wavelet Transform (DWT). Methods/Statistical analysis: This study surveyed and analysed three standard datasets WANG V1.0, WANG V2.0, and Caltech 101. The features an image of objects in this sets that belong to 101 classes-with approximately 40-800 images for every category. The suggested infrastructure within the study seeks to present a description and operationalization of the CBIR system through automated attribute extraction system premised on CN

... Show More
Publication Date
Mon Jun 20 2022
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
DESCRIPTION OF THE PREDATOR BUSH CRICKET, SAGA EPHIPPIGERA FISCHER VON WALDHEIM, 1846 (ORTHOPTERA, TETTIGONIIDAE) FROM ERBIL PROVINCE, KURDISTAN REGION- IRAQ
...Show More Authors

The predatory bush crickets Saga ephippigera Fischer Von Waldheim, 1846 is the largest Iraqi orthopterans and one of the most active and successful predators in the Kurdistan region. The nymphs and adults prey on all the stages of various species of insects. Twelve adult specimens were collected from Erbil Province during May 2018 and June 2021. Morphological structures of the adult insects were described and illustrated in details; important taxonomic characteristics of body regions with their appendages were chosen; and the results indicated the importance of morphological characteristics which confirmed the identification of this species correctly.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
Comparison of The Effect of Aqueous Extracts of two Plants, Origanum Vulgare L. and Fenugreek Seeds with Anticancer Drug Cis-Platin on the Growth of Cancer Cell Lines
...Show More Authors

This study involved the effect of the aqueous extracts of two plants, Origanum vulgare L.(1), Trigonella Foenum Graecum L. (Fenugreek) seeds(2) on the growth of cancer cell lines. Rhabdomyo sarcomas (RD) of human cell line and female intestine cells of Albino mice (L20B) in vitro System. These extracts were compared with the known anticancer drug Cis-platinum(Cis-Pt) as a positive control. The phytochemical tests were used for screening the active compounds in plants. The inhibition activity assay was used as a parameter of the cytotoxic effect of these extracts. Cancer cell lines were treated with four concentrations of Cis-platin, 31.25, 62.5, 125 and 250 ?g/ml for 72 hour exposure time. The same concentrations were used for the other ext

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref