Preferred Language
Articles
/
joe-2128
A Linear Programming Method Based Optimal Power Flow Problem for Iraqi Extra High Voltage Grid (EHV)
...Show More Authors

The objective of an Optimal Power Flow (OPF) algorithm is to find steady state operation point which minimizes generation cost, loss etc. while maintaining an acceptable system performance in terms of limits on generators real and reactive powers, line flow limits etc. The OPF solution includes an objective function. A common objective function concerns the active power generation cost. A Linear programming method is proposed to solve the OPF problem. The Linear Programming (LP) approach transforms the nonlinear optimization problem into an iterative algorithm that in each iteration solves a linear optimization problem resulting from linearization both the objective function and constrains. A computer program, written in MATLAB environment, is developed to represent the proposed method. The adopted program is applied for the first time on Iraqi 24 bus Extra High Voltage (EHV) network (400 kV). The required are data taken from the operation and control office, which belongs to the ministry of electricity.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 01 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Content-Based Cartoon Image Retrieval
...Show More Authors

Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Windows-Based Special Applications Router
...Show More Authors

The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 03 2024
Journal Name
Phi Delta Kappan
Literacy-based instruction in STEM
...Show More Authors

Socio-scientific issues provide a great platform to both engage students in scientific topics and assess their understanding of scientific concepts. Nancy R. Singer, Amy Lannin, Maha Kareem, William Romine, and Katie Kline report on the STEM Literacy Project, a three-year National Science Foundation grant that aimed to improve STEM teachers’ knowledge and integration of literacy in their classrooms. They describe teachers’ professional learning, scenario-based assessments and other strategies they incorporated in their STEM classrooms, and how writing enables students to understand real-world issues.

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Hybrid CNN-based Recommendation System
...Show More Authors

Recommendation systems are now being used to address the problem of excess information in several sectors such as entertainment, social networking, and e-commerce. Although conventional methods to recommendation systems have achieved significant success in providing item suggestions, they still face many challenges, including the cold start problem and data sparsity. Numerous recommendation models have been created in order to address these difficulties. Nevertheless, including user or item-specific information has the potential to enhance the performance of recommendations. The ConvFM model is a novel convolutional neural network architecture that combines the capabilities of deep learning for feature extraction with the effectiveness o

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Fri Apr 15 2016
Journal Name
International Journal Of Computer Applications
Hybrid Techniques based Speech Recognition
...Show More Authors

Information processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (

... Show More
View Publication
Crossref
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
PANI/MWCNT based humidity sensor
...Show More Authors

Polyaniline Multi wall Carbon nanotube (PANI/MWCNTs) nanocomposite thin films have been prepared by Plasma jet polymerization at low frequency on glass substrate with preliminary deposited aluminum electrodes to form Al/PANI-MWCNT/Al surface-type capacitive humidity sensors, the gap between the electrodes about 50 μm and the MWCNTs weight concentration varied between 0, 1, 2, 3, 4%. The diameter of the MWCNTs was in the range of 8-15 nm and the length 10-55 μm. The capacitance-humidity relationships of the sensors were investigated at humidity levels from 35 to 90% RH. The electrical properties showed that the capacity increased with increasing relative humidity, and that the sensitivity of the sensor increases with the increase of the

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Determinants of Investment Allocations in the Agricultural Sector in Iraq : A Comparison Between the Method of least Squares Approach and the errror Correction Model
...Show More Authors

Abstract

                 The research aimed to test the relationship between the size of investment allocations in the agricultural sector in Iraq and their determinants using the Ordinary Least Squares (OLS) method compared to the Error Correction Model (ECM) approach. The time series data for the period from 1990 to 2021 was utilized. The analysis showed that the estimates obtained using the ECM were more accurate and significant than those obtained using the OLS method. Johansen's test indicated the presence of a long-term equilibrium relationship between the size of investment allocations and their determinants. The results of th

... Show More
View Publication Preview PDF
Publication Date
Sun May 11 2025
Journal Name
Journal Of Information Systems Engineering And Management
The Effect of the Learning Mastery Strategy using Interactive Learning Techniques as a Therapeutic Method on the Achievement of Secondary School Students in Mathematics
...Show More Authors

  The current research aims to identify the effect of the learning mastery strategy using interactive learning as a therapeutic method on the achievement of secondary school students in mathematics. To achieve the research objective, the researcher selected second-grade middle school students at Al-Haybah Intermediate School for Boys and determined his research sample, which consisted of (77) students distributed into two sections: Section (A) the experimental group, with (38) students, and Section (B) the control group, with (39) students. The statistical equivalence of the two research sample groups was confirmed in the variables (intelligence test, previous achievement, and previous knowledge test). The researchers chose the par

... Show More
View Publication
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A comparison between Bayesian Method and Full Maximum Likelihood to estimate Poisson regression model hierarchy and its application to the maternal deaths in Baghdad
...Show More Authors

Abstract:

 This research aims to compare Bayesian Method and Full Maximum Likelihood to estimate hierarchical Poisson regression model.

The comparison was done by  simulation  using different sample sizes (n = 30, 60, 120) and different Frequencies (r = 1000, 5000) for the experiments as was the adoption of the  Mean Square Error to compare the preference estimation methods and then choose the best way to appreciate model and concluded that hierarchical Poisson regression model that has been appreciated Full Maximum Likelihood Full Maximum Likelihood  with sample size  (n = 30) is the best to represent the maternal mortality data after it has been reliance value param

... Show More
View Publication Preview PDF
Crossref