This paper aims to improve the voltage profile using the Static Synchronous Compensator (STATCOM) in the power system in the Kurdistan Region for all weak buses. Power System Simulation studied it for Engineers (PSS\E) software version 33.0 to apply the Newton-Raphson (NR) method. All bus voltages were recorded and compared with the Kurdistan region grid index (0.95≤V ≤1.05), simulating the power system and finding the optimal size and suitable location of Static Synchronous Compensator (STATCOM)for bus voltage improvement at the weakest buses. It shows that Soran and New Koya substations are the best placement for adding STATCOM with the sizes 20 MVAR and 40 MVAR. After adding STATCOM with the sizes [20MVAR and 40MVAR] at Soran to the test, it is seen that the total average change in voltage profile for the system improved results in about 17.34 % in average per unit change for the 28 weakest buses, which provides a good improvement in stability. Also, the system’s total active power loss reduced from 123.8 MW without STATCOM to 102.8 MW with STATCOM. The results are encouraging for applying the approach to the power system. This approach stands out due to all bus voltages are within acceptable ranges.
Free radicals and oxidative damage caused by them have being suggested to be involved in the pathogenesis of migraine. These may result from distorted equilibrium of pro-oxidant/anti-oxidant system that continuously generates and detoxifies oxidants during normal aerobic metabolism. Escape of such system from equilibrium leads to damage of cellular elements with the depletion of cellular stores of anti-oxidants material such as glutathione and vitamin E. Therefore, free radical scavengers (vitamin E or melatonin) seems to be of potential benefit as prophylactic anti-migraine therapy by neutralizing free radicals overproduction and possibly preventing formation of highly toxic intermediates (such as nitric oxide). In addition of being pow
... Show MoreEffect of antioxidants (vitamins C and E) (500mg/kg) was studied on function of testes in albino mice treated with hexavalent chromium (1000ppm). The results showed that exposure to hexavalent chromium caused a significant decrease in body weights, without changes in weight of testes, seminal vesicles and prostate. A significant decrease was observed in the percentage of dead sperms, sperms abnormalities, diameter of seminiferous tubules and the number of leydig cells. Degenerative changes and necrosis were observed in the lumen of seminiferous tubules. Treatment of hexavalent chromium-exposed mice with vitamin C caused improvement in weights and characters of sperms and improvement of the tissue of seminiferous tubules. Tre
... Show MoreThis study was contacted on Orchidaceae, it is a second largest family in flowering plants, comes
after Asteraceae, and approximately has 25,000–30,000 species in 750–800 genera in the world.
This study included 10 genera, Anacamptis (five species), Androrchis (two species),
Cephalanthera (one species), Dactylorhiza (three species), Epipactis (two species),
Himantoglossum (two species), Limodorum (one species), Neotinea (one species), Ophrys (seven
species ), and Orchis (four species). The name abbreviation of authors of plant names follows the
International Plant Name Index (IPNI) (https://www.ipni.org/). Images of type collections of most
species were checked on virtual herbaria (https://he
Abstract
In this research provide theoretical aspects of one of the most important statistical distributions which it is Lomax, which has many applications in several areas, set of estimation methods was used(MLE,LSE,GWPM) and compare with (RRE) estimation method ,in order to find out best estimation method set of simulation experiment (36) with many replications in order to get mean square error and used it to make compare , simulation experiment contrast with (estimation method, sample size ,value of location and shape parameter) results show that estimation method effected by simulation experiment factors and ability of using other estimation methods such as(Shrinkage, jackknif
... Show MoreA mounted specimen of a mustelid animal deposited in the Kurdistan Museum of Natural History, Salahaddin University, Erbil proved to be Mustela erminea (Linnaeus, 1758) and represents a new record for the mammalian fauna of Iraq. Its measurements and some biological noted are provided. Also, two passerine birds; the Red-headed bunting, Emberiza bruniceps Brandt, 1841(Family, Emberizidae) and the Variable wheatear, Oenanthe picata (Blyth, 1847) (Family, Muscicapidae) were recorded for the first time in Iraq. Furthermore, the tree frog Hyla savignyi Audouin, 1829 was found in two locations north east of Iraq with spotted dorsum and having interesting behavior in having the capabil
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreHiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show More