Preferred Language
Articles
/
joe-2065
Application of Wavelet Packet and S Transforms for Differential Protection of Power Transformer

The differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree. In ST approach,
the spectral energy index and the standard deviation (STD) are calculated from the S-matrix obtained by discrete S-transform. The two approaches are tested for generating a trip signal and disconnecting the transformer supply experimentally using 1KVA, 220/110V, 50Hz, ∆ / Y threephase transformer. The experimental results show that the trip signal is initiated faster in WPT approach while the transformer is disconnected from the supply after a delay of 10-15msec in the
two approaches due to computer interface and the relay circuit used.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
S-maximal Submodules

Throughout this paper R represents a commutative ring with identity and all R-modules M are unitary left R-modules. In this work we introduce the notion of S-maximal submodules as a generalization of the class of maximal submodules, where a proper submodule N of an R-module M is called S-maximal, if whenever W is a semi essential submodule of M with N ⊊ W ⊆ M, implies that W = M. Various properties of an S-maximal submodule are considered, and we investigate some relationships between S-maximal submodules and some others related concepts such as almost maximal submodules and semimaximal submodules. Also, we study the behavior of S-maximal submodules in the class of multiplication modules. Farther more we give S-Jacobson radical of rings

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
S-maximal Submodules

Throughout this paper R represents a commutative ring with identity and all R-modules M are unitary left R-modules. In this work we introduce the notion of S-maximal submodules as a generalization of the class of maximal submodules, where a proper submodule N of an R-module M is called S-maximal, if whenever W is a semi essential submodule of M with N ? W ? M, implies that W = M. Various properties of an S-maximal submodule are considered, and we investigate some relationships between S-maximal submodules and some others related concepts such as almost maximal submodules and semimaximal submodules. Also, we study the behavior of S-maximal submodules in the class of multiplication modules. Farther more we give S-Jacobson radical of ri

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Sun Jul 02 2006
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Crossref
View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Scopus Crossref
View Publication
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Existence and Qualitative Property of Differential Equation with Delayed Arguments

     In this paper, some conditions to guarantee the existence of bounded solution to the second order multi delayed arguments differential equation are given. The Krasnoselskii theorem used to the Lebesgue’s dominated convergence and fixed point to obtain some new sufficient conditions for existence of solutions. Some important lemmas are established that are useful to prove the main results for oscillatory property. We also submitted some sufficient conditions to ensure the oscillation criteria of bounded solutions to the same equation.

Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Sep 25 2018
Journal Name
Iraqi Journal Of Science
Generating dynamic S-BOX based on Particle Swarm Optimization and Chaos Theory for AES

Data security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm  in order to remove these weakness points, Will be generated dynamic substitution box (S-B

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security For Three-Tiered Web Application

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Robust Circular S and Circular Least Squares Estimators for Circular Regression Model using Simulation

In this paper, the Monte-Carlo simulation method was used to compare the robust circular S estimator with the circular Least squares method in the case of no outlier data and in the case of the presence of an outlier in the data through two trends, the first is contaminant with high inflection points that represents contaminant in the circular independent variable, and the second the contaminant in the vertical variable that represents the circular dependent variable using three comparison criteria, the median standard error (Median SE), the median of the mean squares of error (Median MSE), and the median of the mean cosines of the circular residuals (Median A(k)). It was concluded that the method of least squares is better than the

... Show More
Crossref
View Publication
Publication Date
Mon Jan 29 2024
Journal Name
Advances In Systems Analysis, Software Engineering, And High Performance Computing
Evaluating Antivirus Effectiveness Against Malware in Ascending Order for Increasing Blockchain Endpoint Protection

Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%,

... Show More
Crossref (11)
Crossref
View Publication