Preferred Language
Articles
/
joe-2065
Application of Wavelet Packet and S Transforms for Differential Protection of Power Transformer
...Show More Authors

The differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree. In ST approach,
the spectral energy index and the standard deviation (STD) are calculated from the S-matrix obtained by discrete S-transform. The two approaches are tested for generating a trip signal and disconnecting the transformer supply experimentally using 1KVA, 220/110V, 50Hz, ∆ / Y threephase transformer. The experimental results show that the trip signal is initiated faster in WPT approach while the transformer is disconnected from the supply after a delay of 10-15msec in the
two approaches due to computer interface and the relay circuit used.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
في تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5
...Show More Authors

في تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Effect of Partial Substitution of Ge-S-Cd Alloys on the Density of Energy States
...Show More Authors

Five samples of the ternary alloy Ge-S-Cd were created using the melting point method, and the effects of partially substituting cadmium for germanium were determined. and partial substitution of germanium by cadmium was used to study the change in electrical conductivity. Electrical experiments were performed on Ge35-xS65Cdxternary alloy with x = 0, 5, 10, 15, and 20. It was discovered that the conductivity (σdc) rises with rising temperature in all samples under experiment. This confirms that the samples have semiconductor behavior. It has been observed that there are three regions of electrical conductivity in the electrical conductivity curve at low, moderate, and high temperatures. The pr

... Show More
View Publication
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Preparation and Characterization of Silver Nanoparticles and its Medical Application against Pathogenic Bacteria
...Show More Authors

The fabrication of Solid and Hollow silver nanoparticles (Ag NPs) has been achieved and their characterization was performed using transmission electron microscopy (TEM), zeta potential, UV–VIS spectroscopy, and X-ray diffraction (XRD). A TEM image revealed a quasispherical form for both Solid and Hollow Ag NPs. The measurement of surface charge revealed that although Hollow Ag NPs have a zeta potential of -43 mV, Solid Ag NPs have a zeta potential of -33 mV. According to UV-VIS spectroscopy measurement Solid and Hollow Ag NPs both showed absorption peaks at wavelengths of 436 nm and 412 nm, respectively. XRD pattern demonstrates that the samples' crystal structure is cubic, similar to that of the bulk materials, with

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Feb 12 2017
Journal Name
World J Exp Biosc
Detection and sequencing of blaVEB-1 gene in clinical isolates of Proteus mirabilis Isolates from Baghdad City`s hospitals
...Show More Authors

In Present study, 25 clinical isolates of Proteus spp. of clinical samples, urine, wounds and burns collected from different hospitals in Baghdad city, all isolates were identified as Proteus mirabilis using different bacteriological media, biochemical assays and Vitek-2 system. It was found that 15 (60%) isolates were identifying as P. mirabilis. The susceptibility of P. mirabilis isolates to cefotaxime was 66.6 %, while to ceftazidime was 20%. Extended spectrum β-lactamses producing Proteus was 30.7 %. DNA of 5 isolates of P. mirabilis was extracted and detection for blaVEB-1 gene by using multiplex polymerase chain reaction (PCR). Results showed that the presence of this gene in all tested isolates, as an important indicator for increas

... Show More
Publication Date
Tue Dec 12 2017
Journal Name
Al-khwarizmi Engineering Journal
Model Reference Adaptive Control based on a Self-Recurrent Wavelet Neural Network Utilizing Micro Artificial Immune Systems
...Show More Authors

Abstract 

This paper presents an intelligent model reference adaptive control (MRAC) utilizing a self-recurrent wavelet neural network (SRWNN) to control nonlinear systems. The proposed SRWNN is an improved version of a previously reported wavelet neural network (WNN). In particular, this improvement was achieved by adopting two modifications to the original WNN structure. These modifications include, firstly, the utilization of a specific initialization phase to improve the convergence to the optimal weight values, and secondly, the inclusion of self-feedback weights to the wavelons of the wavelet layer. Furthermore, an on-line training procedure was proposed to enhance the control per

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
An Application of the Banzhaf Values for Cooperating Among Producers of Waste Processing in the Al-Mahmudiya Factory
...Show More Authors

     The game theory has been applied to all situations where agents’ (people or companies) actions are utility-maximizing, and the collaborative offshoot of game theory has proven to be a robust tool for creating effective collaboration strategies in a broad range of applications. In this paper first, we employ the Banzhaf values to show the potential cost to waste producers in the case of a cooperation and to reduce the overall costs of processing non-recyclable waste during cooperation between producers. Secondly, we propose an application of the methodology to study a case for five waste producers' waste management in the Al-Mahmudiya factory with the aim of displaying the potential cost to waste producers in case of cooperatio

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Materials Today: Proceedings
WITHDRAWN: Application of net pay for reservoir characterization in carbonate reservoir rock – Case study: South-eastern of Iraq
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue Dec 06 2022
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Application of Strategies about Pragmatic Language for Trainers who work at Autism Centers in Baghdad city
...Show More Authors

Abstract

The study aimed: To assess the level of trainers' knowledge about the application of strategies and to find out the relationship between Trainer's knowledge and their socio-demographic characteristics.

Methodology: Using the pre-experimental design of the current study, for one group of 47 trainers working at the private Autism Centers in Baghdad, data was collected from 8/January / 2022 to 13 /February /2022. Using non-probability samples (convenient samples), self-management technology in which trainers fill out the questionnaire form themselves was used in the data collection process; it was analyzed through descriptive and inference statistics.

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 20 2024
Journal Name
Journal Of Interdisciplinary Mathematics
Elzaki transform decomposition approach to solve Riccati matrix differential equations
...Show More Authors

Elzaki Transform Adomian decomposition technique (ETADM), which an elegant combine, has been employed in this work to solve non-linear Riccati matrix differential equations. Solutions are presented to demonstrate the relevance of the current approach. With the use of figures, the results of the proposed strategy are displayed and evaluated. It is demonstrated that the suggested approach is effective, dependable, and simple to apply to a range of related scientific and technical problems.

Scopus (1)
Scopus