A load-shedding controller suitable for small to medium size loads is designed and implemented based on preprogrammed priorities and power consumption for individual loads. The main controller decides if a particular load can be switched ON or not according to the amount of available power generation, load consumption and loads priorities. When themaximum allowed power consumption is reached and the user want to deliver power to additional load, the controller will decide if this particular load should be denied receiving power if its priority is low. Otherwise, it can be granted to receive power if its priority is high and in this case lower priority loads are automatically switched OFF in order not to overload the power generation. The main idea of the proposed LS controller is to minimize the amount of the isolated load without overloading the power system. In this paper, three versions of load shedding controller were implemented using Altera DE2-115 FPGA; with number of loads equal 32, 64 and 128 for each controller.
This research has come out with that strategies made by Porter as generally strategies applicable to any size and type of economic units cannot be applied to many of the economic units in the world in generally and in Iraq especially not a lot of economic units have the resources and competencies that enable them to provide a unique product of its kind in the minds of customers and then adopt a differentiation strategy and not a lot of economic units have the resources and competencies that make them the cost leader. Differentiators and cost leaders are minority in the world while not differentiators and not cost leaders are majority in the world.
The economic units are not differentiators and not c
... Show MoreThis research presents a particular designing strategy for a free form of surfaces, constructed by the lofting design method. The regarded surfaces were created by sliding a B-spline curves (profile curves), in addition to describing an automatic procedure for selective identification of sampling points in reverse engineering applications using Coordinate Measurement Machine. Two models have been implemented from (Ureol material) to represent the different cases of B-spline types to clarify its scope of application. The interior data of the desired surfaces was designed by MATLAB software, which then were transformed to UG-NX9 software for connecting the sections that were designed in MATLAB program and obtaining G-code programs for the
... Show MoreIn this paper, a single-phase boost type ac-dc converter with power factor correction (PFC) technique is designed and implemented. A current mode control at a constant switching frequency is used as a control strategy for PFC converter. The PFC converter is a single-stage singleswitch boost converter that uses a current shaping technique to reshape the non-sinusoidal input current drawn by the bulky capacitor in the conventional rectifier. This technique should provide an input current with almost free-harmonics, comply with the IEC61000-3-2 limits, and a system operates with near unity power factor. The other function of the boost converter that should be
accomplished is to provide a regulated DC output voltage. The complete designed
Speech recognition is a very important field that can be used in many applications such as controlling to protect area, banking, transaction over telephone network database access service, voice email, investigations, House controlling and management ... etc. Speech recognition systems can be used in two modes: to identify a particular person or to verify a person’s claimed identity. The family speaker recognition is a modern field in the speaker recognition. Many family speakers have similarity in the characteristics and hard to identify between them. Today, the scope of speech recognition is limited to speech collected from cooperative users in real world office environments and without adverse microphone or channel impairments.
Due to the large size of dealing in the transactions installment sales in durable products, especially real estate given the privacy to enjoy their property, among other products because of the large amount and the length of the repayment period leading to a risk of non-payment by the buyer because of the possibility to change the credit level to him, especially that most of this type of transaction customers are from limited income owners, So it has been proposed the use of other transactions in handling real estate instead of installment sales transactions, a rental sale transactions because of the protection provided by this transaction for a vendor that will be mentioned later.
So proposes to st
... Show MoreRutting has a significant impact on the pavements' performance. Rutting depth is often used as a parameter to assess the quality of pavements. The Asphalt Institute (AI) design method prescribes a maximum allowable rutting depth of 13mm, whereas the AASHTO design method stipulates a critical serviceability index of 2.5 which is equivalent to an average rutting depth of 15mm. In this research, static and repeated compression tests were performed to evaluate the permanent strain based on (1) the relationship between mix properties (asphalt content and type), and (2) testing temperature. The results indicated that the accumulated plastic strain was higher during the repeated load test than that during the static load tests. Notably, temperatur
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreObjectives This work presents laser coating of grade 1 pure titanium (Ti) dental implant surface with sintered biological apatite beta-tricalcium phosphate (β-TCP), which has a chemical composition close to bone. Materials and methods Pulsed Nd:YAG laser of single pulse capability up to 70 J/10 ms and pulse peak power of 8 kW was used to implement the task. Laser pulse peak power, pulse duration, repetition rate and scanning speed were modulated to achieve the most homogenous, cohesive and highly adherent coat layer. Scanning electron microscopy (SEM), energy dispersive X-ray microscopy (EDX), optical microscopy and nanoindentation analyses were conducted to characterise and evaluate the microstructure, phases, modulus of elasticity
... Show More