Preferred Language
Articles
/
joe-2065
Application of Wavelet Packet and S Transforms for Differential Protection of Power Transformer

The differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree. In ST approach,
the spectral energy index and the standard deviation (STD) are calculated from the S-matrix obtained by discrete S-transform. The two approaches are tested for generating a trip signal and disconnecting the transformer supply experimentally using 1KVA, 220/110V, 50Hz, ∆ / Y threephase transformer. The experimental results show that the trip signal is initiated faster in WPT approach while the transformer is disconnected from the supply after a delay of 10-15msec in the
two approaches due to computer interface and the relay circuit used.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Approximate Analytical Solutions of Bright Optical Soliton for Nonlinear Schrödinger Equation of Power Law Nonlinearity

This paper introduces the Multistep Modified Reduced Differential Transform Method (MMRDTM). It is applied to approximate the solution for Nonlinear Schrodinger Equations (NLSEs) of power law nonlinearity. The proposed method has some advantages. An analytical approximation can be generated in a fast converging series by applying the proposed approach. On top of that, the number of computed terms is also significantly reduced. Compared to the RDTM, the nonlinear term in this method is replaced by related Adomian polynomials prior to the implementation of a multistep approach. As a consequence, only a smaller number of NLSE computed terms are required in the attained approximation. Moreover, the approximation also converges rapidly over a

... Show More
Scopus (11)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
New White Method of Parameters and Reliability Estimation for Transmuted Power Function Distribution

        In this paper, an estimate has been made for parameters and the reliability function for Transmuted power function (TPF) distribution through using some estimation methods as proposed new technique for white, percentile, least square, weighted least square and modification moment methods. A simulation was used to generate random data that follow the (TPF) distribution on three experiments (E1 , E2 , E3)  of the real values of the parameters, and with sample size (n=10,25,50 and 100) and iteration samples (N=1000), and taking reliability times (0< t < 0) . Comparisons have been made between the obtained results from the estimators using mean square error (MSE). The results showed the

... Show More
Scopus (5)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Thu Aug 08 2019
Journal Name
Political Sciences Journal
The Neo-Conservative and call for the dominance of US military power globally

Abstrct

The administrations of Presidents Clinton and Bush Jr. have seen the emergence of neoconservatives. The neoconservative were the establishment of the Project for the New American Century (PNAC) project in 1997 during the Clinton administration. The neoconservatives, through the New Century Project, were able to make important foreign policy decisions, notably the Iraq Liberation Law, which was passed by Congress on January 26, 1998 and signed by President Clinton and became a law legitimized. Clinton became authorized to take whatever measures he saw fit to contribute to regime change in Iraq. The Bush administration has also undergone major and significant shifts in US strategy on US foreign policy. During the Bush admin

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Comparison Study of Electromyography Using Wavelet and Neural Network

In this paper we present a method to analyze five types with fifteen wavelet families for eighteen different EMG signals. A comparison study is also given to show performance of various families after modifying the results with back propagation Neural Network. This is actually will help the researchers with the first step of EMG analysis. Huge sets of results (more than 100 sets) are proposed and then classified to be discussed and reach the final.

View Publication Preview PDF
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Image Compression Using Tap 9/7 Wavelet Transform and Quadtree Coding Scheme

This paper is concerned with the design and implementation of an image compression method based on biorthogonal tap-9/7 discrete wavelet transform (DWT) and quadtree coding method. As a first step the color correlation is handled using YUV color representation instead of RGB. Then, the chromatic sub-bands are downsampled, and the data of each color band is transformed using wavelet transform. The produced wavelet sub-bands are quantized using hierarchal scalar quantization method. The detail quantized coefficient is coded using quadtree coding followed by Lempel-Ziv-Welch (LZW) encoding. While the approximation coefficients are coded using delta coding followed by LZW encoding. The test results indicated that the compression results are com

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
A Double Embedding of an Anti-Removable Visible Logo Using Discrete Wavelet Transform and Chaotic Map

     The aims of visible watermarking are to prevent the illegal copying of videos and images and to avoid the theft and unauthorized advertisement of the legitimate owners' content. The visible watermark is distinguishable with the naked eye. This makes it easily removed by an attacker. This paper proposes an anti-removable visible logo by double embedding using the discrete wavelet transform (DWT) and a chaotic map. The main purpose of this method is to prevent the removal attack and restore the original video without information loss after the logo is legally removed. DWT is used for both the cover area and the logo to embed sub-bands of information from the cover area into sub-bands of the logo. The main idea of using a chaotic m

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Jan 10 2018
Journal Name
International Journal Of Science And Research (ijsr)
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Differential evolution detection models for SMS spam

With the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative

... Show More
Scopus (7)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Tue Oct 25 2022
Journal Name
Minar Congress 6
HANDWRITTEN DIGITS CLASSIFICATION BASED ON DISCRETE WAVELET TRANSFORM AND SPIKE NEURAL NETWORK

In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database

View Publication Preview PDF
Publication Date
Sat Jun 03 2023
Journal Name
Iraqi Journal Of Science
Face Recognition Using Stationary wavelet transform and Neural Network with Support Vector Machine

Face recognition is a type of biometric software application that can identify a specific
individual in a digital image by analyzing and comparing patterns. It is the process of
identifying an individual using their facial features and expressions.
In this paper we proposed a face recognition system using Stationary Wavelet Transform
(SWT) with Neural Network, the SWT are applied into five levels for feature facial
extraction with probabilistic Neural Network (PNN) , the system produced good results
and then we improved the system by using two manner in Neural Network (PNN) and
Support Vector Machine(SVM) so we find that the system performance is more better
after using SVM where the result shows the performance o

... Show More
View Publication Preview PDF