Preferred Language
Articles
/
joe-374
A Real-Time Fuzzy Load Flow and Contingency Analysis Based on Gaussian Distribution System
...Show More Authors

Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed  method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gives reduction in overall computation time and storage requirements. The performance of the used methods had been tested on two typical test systems being the IEEE 14-bus and 30-bus systems in addition to the 362-bus Iraqi National Grid. All the obtained results under normal operating conditions show that the computation time of the fuzzy Load Flow (FLF) is less than the fast decoupled load flow (FDLF).

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 02 2023
Journal Name
Narst 2023 Annual International Conference
Measuring Claim-Evidence-Reasoning Using Scenario-based Assessments Grounded in Real-world Issues
...Show More Authors

Improving students’ use of argumentation is front and center in the increasing emphasis on scientific practice in K-12 Science and STEM programs. We explore the construct validity of scenario-based assessments of claim-evidence-reasoning (CER) and the structure of the CER construct with respect to a learning progression framework. We also seek to understand how middle school students progress. Establishing the purpose of an argument is a competency that a majority of middle school students meet, whereas quantitative reasoning is the most difficult, and the Rasch model indicates that the competencies form a unidimensional hierarchy of skills. We also find no evidence of differential item functioning between different scenarios, suggesting

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Engineering
Development of Bridges Maintenance Management System based on Geographic Information System Techniques (Case study: AlMuthanna \ Iraq)
...Show More Authors

A Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated vi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Sep 02 2012
Journal Name
Baghdad Science Journal
New Fuzzy Normed Spaces
...Show More Authors

In this paper the research introduces a new definition of a fuzzy normed space then the related concepts such as fuzzy continuous, convergence of sequence of fuzzy points and Cauchy sequence of fuzzy points are discussed in details.

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Applied And Computational Mathematics
Reliable computational methods for solving Jeffery-Hamel flow problem based on polynomial function spaces
...Show More Authors

Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of New Theory
Fuzzy Orbit Irresolute Mappings
...Show More Authors

Fuzzy orbit topological space is a new structure very recently given by [1]. This new space is based on the notion of open fuzzy orbit sets. The aim of this paper is to provide applications of open fuzzy orbit sets. We introduce the notions of fuzzy orbit irresolute mappings and fuzzy orbit open (resp. irresolute open) mappings and studied some of their properties. .

Publication Date
Wed Jan 01 2020
Journal Name
Indian Journal Of Forensic Medicine And Toxicology
Continuous Flow Injection Analysis,Turbidmetric and Photometric Determination of Methyldopa Using a New Long Distance Chasing Photometer (NAG-ADF-300-2)
...Show More Authors

A specific, sensitive and new simple method was used for the determination of methyldopa in pure and pharmaceutical formulations by using continuous flow injection analysis. This method is based on formation of ion pair compound between methyldopa and potassium hexacyanoferrate in acidic medium to obtain a yellow precipitate complex using long distance chasing photometer (NAG-ADF-300-2). The linear range for calibration graph was 0.05-35 mmol/L for cell A and 0.05-25 mmol/L for cell B, and LOD 1.4292 µg /200 µL for both cells with correlation coefficient (r) 0.9981 for cell A and 0.9994 for cell B, RSD% was lower than 0.5 % for n=8 for. The results were compared with classical method UV-Spectrophotometric at λ max=280 nm and turbi

... Show More
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Experimental and Numerical Analysis of Incompressible Flow over an Iced Airfoil
...Show More Authors

Determining the aerodynamic characteristics of iced airfoil is an important step in aircraft design.  The goal of this work is to study experimentally and numerically an iced airfoil to assess the aerodynamic penalties associated with presence of ice on the airfoil surface. Three iced shapes were tested on NACA 0012 straight wing at zero and non-zero angles of attack, at Reynolds No. equal to (3.36*105). The 2-D steady state continuity and momentum equations have been solved utilizing finite volume method to analyze the turbulent flow over a clean and iced airfoil. The results show that the ice shapes affected the aerodynamic characteristics due to the change in airfoil shape. The experimental results show that the horn iced airfoil

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Coronavirus Disease Diagnosis, Care and Prevention (COVID-19) Based on Decision Support System
...Show More Authors

              Automated clinical decision support system (CDSS) acts as new paradigm in medical services today. CDSSs are utilized to increment specialists (doctors) in their perplexing decision-making. Along these lines, a reasonable decision support system is built up dependent on doctors' knowledge and data mining derivation framework so as to help with the interest the board in the medical care gracefully to control the Corona Virus Disease (COVID-19) virus pandemic and, generally, to determine the class of infection and to provide a suitable protocol treatment depending on the symptoms of patient. Firstly, it needs to determine the three early symptoms of COVID-19 pandemic criteria (fever, tiredness, dry cough and breat

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri May 04 2018
Journal Name
Wireless Personal Communications
IFRS: An Indexed Face Recognition System Based on Face Recognition and RFID Technologies
...Show More Authors

View Publication
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref