Preferred Language
Articles
/
joe-2065
Application of Wavelet Packet and S Transforms for Differential Protection of Power Transformer

The differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree. In ST approach,
the spectral energy index and the standard deviation (STD) are calculated from the S-matrix obtained by discrete S-transform. The two approaches are tested for generating a trip signal and disconnecting the transformer supply experimentally using 1KVA, 220/110V, 50Hz, ∆ / Y threephase transformer. The experimental results show that the trip signal is initiated faster in WPT approach while the transformer is disconnected from the supply after a delay of 10-15msec in the
two approaches due to computer interface and the relay circuit used.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Scopus (3)
Scopus Crossref
View Publication
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Educational And Psychological Researches
Self Protection and it's Relation with the social ignorance OF UNIVERSITY STUDENTS

The aim of this research is to find a relation between self-protection and the social - ignorance of the univresity students. In applying the aims of the reaearch, the ressearcher has constructed two scales to measure
self - protection and the social - ignorance. After finding their validity and stability and their discriminative power, the researcher has applied them on a sample of (200) male and female. University students, who were selected randomly. The results of the research has arrived at finding a positive relation between self-protection and social - ignorance.

The researcher has recommended a concentration on the role of parents in raising their childern depending on themselves and making f

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 19 2024
Journal Name
Journal Of College Of Law For Legal And Political Sciences
View Publication
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
View Publication Preview PDF
Publication Date
Mon May 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Improvement Using The Combination of Wavelet and Multiwavelet Transform

      This paper introduces method of image enhancement using the combination of both wavelet and Multiwavelet transformation. New technique is proposed for image enhancement using one smoothing filter.

    A critically- Sampled Scheme of preprocessing method is used for computing the Multiwavelet.It is the 2nd norm approximation used to speed the procedures needed for such computation.

  An improvement was achieved with the proposed method in comparison with the conventional method. 

The performance of this technique has been done by computer using Visual Baisec.6 package.

View Publication Preview PDF
Publication Date
Tue Dec 13 2022
Journal Name
Lecture Notes In Networks And Systems
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Feb 10 2019
Journal Name
Iraqi Journal Of Physics
Thermoelectric power for thermally deposited cadmium telluride films

Thermal evaporation method has used for depositing CdTe films
on corning glass slides under vacuum of about 10-5mbar. The
thicknesses of the prepared films are400 and 1000 nm. The prepared
films annealed at 573 K. The structural of CdTe powder and prepared
films investigated. The hopping and thermal energies of as deposited
and annealed CdTe films studied as a function of thickness. A
polycrystalline structure observed for CdTe powder and prepared
films. All prepared films are p-type semiconductor. The hopping
energy decreased as thickness increased, while thermal energy
increased.

Crossref
View Publication Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Existence and Uniqueness Theorem of Fuzzy Stochastic Ordinary Differential Equations

     A fuzzy valued diffusion term, which in a fuzzy stochastic differential equation refers to one-dimensional Brownian motion, is defined by the meaning of the stochastic integral of a fuzzy process. In this paper, the existence and uniqueness theorem of fuzzy stochastic ordinary differential equations, based on the mean square convergence of the mathematical induction approximations to the associated stochastic integral equation, are stated and demonstrated.

Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Jan 15 2022
Journal Name
Mest Journal
SMARTPHONE APPLICATION FOR MANAGING MISSED AND FOUND BELONGINGS

Nowadays, due to our everyday stress and current stressful lifestyle, the loss of items appears a frequent issue and may be very inconvenient. In this regard, until the IoT becomes part of everyday life, we can use the software as an efficient tool to assist a person's searching, verifying, and finding lost belongings. This paper presents an Android-based application that we proposed and implemented to help users find lost items. Utilizing this software will enable the subscriber to record his request to the relevant authority. In addition, a special section offers to insert a contact telephone number or email to communicate between the person who found the item and the person who lost it. During testing, among other services, the p

... Show More
Crossref (1)
Crossref
View Publication