The load shedding scheme has been extensively implemented as a fast solution for unbalance conditions. Therefore, it's crucial to investigate supply-demand balancing in order to protect the network from collapsing and to sustain stability as possible, however its implementation is mostly undesirable. One of the solutions to minimize the amount of load shedding is the integration renewable energy resources, such as wind power, in the electric power generation could contribute significantly to minimizing power cuts as it is ability to positively improving the stability of the electric grid. In this paper propose a method for shedding the load base on the priority demands with incorporating the wind power generated. The higher priority demands are fed with a reliable wind energy resource in order to protect them from shedding under contingency condition such as high overloading by the real time monitoring of the network accompanied with power reducing for the lower priority demands. The simulation results prove effectiveness and practicality of the applied method paving the way for possible applications in power systems.
Abstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition
... Show MoreThe Costing Accounting is one the analytic tools which plays important role by support the management in planning& control and decisions-making ,as it became attendant necessity to establish any project whether industrial ,commercial ,service or agriculture ..etc.
The consolidated accounting system has committed the companies to have their active costing system in which the management can obtain their own data, but we found most of the economic units face problems of applying the costing system because of reasons related to the system design itself or might be related to the requirements of the application success.
... Show MoreResearchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, Iraqi Journal of Science, 2023
Geographic information system (GIS) is utilized in a variety of tasks such as, resource management, urban planning, emergency planning in case of accident, and rapid response etc. The aim of this study is to produce a digital map with the aid of GIS and a survey data. A survey data is conducted with Total Station technique on sanitary planning positions. The campus of Baghdad University is chosen to test the execution and accuracy of the results for sewer manholes locations. During the field survey, Total Station (Nikon Nivo) is used to identify the 3-D coordinates for each location. Finally, Geographical Information System (GIS) are utilized to present the digital map of the network sewer pipe line to the end users. Although Geographic Inf
... Show MoreThe coefficient of charge transfer at heterogeneous devices of Au metal with a well-known dyeis investigations using quantum model.Four different solvent are used to estimation the effective transition energy. The potential barrier at interface of Au and dye has been determined using effective transition energy and difference between the Fermi energy of Au metal and ionization energy of dye. A possible transfer mechanism cross the potential barrier dyeand coupling strength interaction between the electronic levels in systems of Au and is discussed.Differentdata of effective transition energy and potential barrier calculations suggest that solvent is more suitable to binds Au with dye.
Background: Ulcerative colitis (UC) is an inflammatory bowel disease restricted to the large intestine, characterized by superficial ulceration. It is a progressive and chronic disease requiring long-term treatment. Although its etiology remains unknown, it is suggested that environmental factors influence genetically susceptible individuals, leading to the onset of the disease. (C-X-C) ligand 9 is a chemokine that belongs to the CXC chemokine family, it plays a role in the differentiation of immune cells such as cytotoxic lymphocytes, natural killer T cells, and macrophages. Its interaction with its corresponding receptor CXCR3 which is expressed by a variety of cells such as effector T cells, CD8+ cytotoxic T cells, and macrophage
... Show MoreThe complexation between folic acid and a typical polyaromatic hydrocarbon, fluorene, was investigated using FTIR and UV spectra. Appearance of a new IR band at 2401cm−1 demonstrates that NH2–C=N moiety on pterin ring in folic acid is protonated when fluorene is introduced. The emergence of two charge transfer bands at 217 nm and 278 nm in UV difference spectra shows the presence of π-π complexation between folic acid and fluorene. These experiments confirm that fluorene could combine with the pterin ring of folic acid through π-π donor–acceptor interaction and induce the protonation process in folic acid upon strengthening electron accepting ability of pterin ring. The results suggest that complexatio
... Show MoreThis study has contributed to understanding a delayed prey-predator system involving cannibalism. The system is assumed to use the Holling type II functional response to describe the consuming process and incorporates the predator’s refuge against the cannibalism process. The characteristics of the solution are discussed. All potential equilibrium points have been identified. All equilibrium points’ local stability analyses for all time delay values are investigated. The system exhibits a Hopf bifurcation at the coexistence equilibrium, which is further demonstrated. The center manifold and normal form theorems for functional differential equations are then used to establish the direction of Hopf bifurcation and the stability of the per
... Show More