The main function of a power system is to supply the customer load demands as economically as possible. Risk criterion is the probability of not meeting the load. This paper presents a methodology to assess probabilistic risk criteria of Al-Qudus plant before and after expansion; as this plant consists of ten generating units presently and the Ministry Of Electricity (MOE) is intending to compact four units to it in order to improve the performance of Iraqi power system especially at Baghdad region. The assessment is calculated by a program using Matlab programming language; version 7.6. Results show that the planned risk is (0.003095) that is (35 times) less than that in the present plant risk; (0.1091); which represents respectable improvement. This probabilistic method can also be used to find the planned risk level of every plant to be compact in the Iraqi electrical network on the future; or any other power systems; and compare it with the present criterion which is very useful to determine the necessary generation capacity expansion.
Background: Gastroesophageal reflux disease, is a quite prevalent gastrointestinal disease, among which gastric content (excluding the air) returns into the oral cavity. Many 0ral manifestations related t0 this disease include tooth wear, dental caries also changes in salivary flow rate and pH. This study was conducted among gastroesophageal reflux disease patients in order to assess tooth wear in relation to salivary flow rate and pH among these patients and the effect of gastroesophageal reflux disease duration on this relation. Materials and methods: One hundred patients participate in this cross-sectional study for both genders and having an age range of 20-40 years old, patients had been endoscopically identified as having gastroeso
... Show MoreThe objective of drilling parameters optimization in Majnoon oilfield is to arrive for a methodology that considers the past drilling data for five directional wells at 35 degree of inclination as a baseline for new wells to be drilled. Also, to predicts drilling performance by selecting the applied drilling parameters generated the highest rate of penetration (ROP) at each section. The focal point of the optimization process is to reduce drilling time and associated cost per each well. The results of this study show that the maximum ROP could not be achieved without sufficient flow rate to cool and clean the bit in clay intervals (36" and 24") hole sections. Although the influence of combination of Weight on Bit (WOB), Round per minute
... Show MoreThe effect of thickness variation on some physical properties of hematite α-Fe2O3 thin films was investigated. An Fe2O3 bulk in the form of pellet was prepared by cold pressing of Fe2O3 powder with subsequent sintering at 800 . Thin films with various thicknesses were obtained on glass substrates by pulsed laser deposition technique. The films properties were characterized by XRD, and FT-IR. The deposited iron oxide thin films showed a single hematite phase with polycrystalline rhombohedral crystal structure .The thickness of films were estimated by using spectrometer to be (185-232) nm. Using Debye Scherrerś formula, the average grain size for the samples was found to be (18-32) nm. Atomic force microscopy indicated that the films had
... Show MoreObjective: The aims of research to identify sample of websites of Arabian medical periodicals and exam applying to
standards for publishing on the internet.
Methodology: A survey method is applied about nine medical periodicals websites and data are collected through
forms include five international standards to assessing websites.
Results: of data collected, the following findings are obtained:
1. Through examining website addresses, unsuitability was found in using Universal Resources Locater, because six of
periodicals use com. in URL. While, all of them not relevance commercial but scientific aim.
2. To measure Credibility Standard by adopting numbers values, the results found, four of periodicals obtained (level
The study aimed to reveal the level of knowledge and tendencies of high- study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with brain-based learning (BBL). And Then, putting a proposed concept to develop knowledge and tendencies of high-study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with Brain-based learning (BBL). For achieving this goal, a cognitive test and a scale of tendency were prepared to apply harmonious strategies with brain-based learning. The descriptive approach was used because it suits the goals of the study. The study sample consisted of (70) male and female students of postgraduate
... Show MoreThe reaction oisolated and characterized by elemental analysis (C,H,N) , 1H-NMR, mass spectra and Fourier transform (Ft-IR). The reaction of the (L-AZD) with: [VO(II), Cr(III), Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Hg(II)], has been investigated and was isolated as tri nuclear cluster and characterized by: Ft-IR, U. v- Visible, electrical conductivity, magnetic susceptibilities at 25 Co, atomic absorption and molar ratio. Spectroscopic evidence showed that the binding of metal ions were through azide and carbonyl moieties resulting in a six- coordinating metal ions in [Cr (III), Mn (II), Co (II) and Ni (II)]. The Vo (II), Cu (II), Zn (II), Cd (II) and Hg (II) were coordinated through azide group only forming square pyramidal
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Due to the continuing demand for larger bandwidth, the optical transport becoming general in the access network. Using optical fiber technologies, the communications infrastructure becomes powerful, providing very high speeds to transfer a high capacity of data. Existing telecommunications infrastructures is currently widely used Passive Optical Network that apply Wavelength Division Multiplexing (WDM) and is awaited to play an important role in the future Internet supporting a large diversity of services and next generation networks. This paper presents a design of WDM-PON network, the simulation and analysis of transmission parameters in the Optisystem 7.0 environment for bidirectional traffic. The simulation shows the behavior of optical
... Show MoreAbstract
Due to the continuing demand for larger bandwidth, the optical transport becoming general in the access network. Using optical fiber technologies, the communications infrastructure becomes powerful, providing very high speeds to transfer a high capacity of data. Existing telecommunications infrastructures is currently widely used Passive Optical Network that apply Wavelength Division Multiplexing (WDM) and is awaited to play an important role in the future Internet supporting a large diversity of services and next generation networks. This paper presents a design of WDM-PON network, the simulation and analysis of transmission parameters in the Optisystem 7.0 environment for bidirectional traffic. The sim
... Show MoreAn adaptive fuzzy weighted linear regression model in which the output is based
on the position and entropy of quadruple fuzzy numbers had dealt with. The solution
of the adaptive models is established in terms of the iterative fuzzy least squares by
introducing a new suitable metric which takes into account the types of the influence
of different imprecisions. Furthermore, the applicability of the model is made by
attempting to estimate the fuzzy infant mortality rate in Iraq using a selective set of
inputs.