Preferred Language
Articles
/
joe-847
Demand Priority in a Power System With Wind Power Contribution Load Shedding Scheme Based
...Show More Authors

The load shedding  scheme has been extensively implemented as a fast solution for unbalance conditions. Therefore, it's crucial to investigate supply-demand balancing in order to protect the network from collapsing and to sustain stability as possible, however its implementation is mostly undesirable. One of the solutions to minimize the amount of load shedding is the integration renewable energy  resources, such as wind power, in the electric power generation could contribute significantly to minimizing power cuts as it is ability to positively improving the stability of the electric grid. In this paper propose a method for shedding the load base on the priority demands with incorporating the wind power generated. The higher priority demands are fed with a reliable wind energy resource in order to protect them from shedding under contingency condition such as high overloading by the real time monitoring of the network accompanied with power reducing for the lower priority demands. The simulation results prove effectiveness and practicality of the applied method paving the way for possible applications in power systems.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 16 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Fracture resistance of weakened premolars restored with sonically-activated composite, bulk-filled and incrementally-filled composites(A comparative in vitro study)
...Show More Authors

Background: This study was conducted to assess the effect of sonic activation and bulk placement of resin composite in comparison to horizontal incremental placement on the fracture resistance of weakened premolar teeth. Materials and method: Sixty sound human single-rooted maxillary premolars extracted for orthodontic purposes were used in this study. Teeth were divided into six groups of ten teeth each: Group 1 (sound unprepared teeth as a control group), Group 2 (teeth prepared with MOD cavity and left unrestored), Group 3 (restored with SonicFill™ composite), Group 4 (restored with Quixfil™ composite), Group 5 (restored with Tertic EvoCeram® Bulk Fill composite) and Group 6 (restored with Universal Tetric EvoCeram® co

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 16 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Dental caries among a group of boys with β-thalassemia major (10-12 years old) in relation to salivary Mutans streptococci
...Show More Authors

Background: Beta thalassemia major is an inherited disorder that may affect general and oral health.The purpose of this study was toassess the severity of dental caries in relation to oral cleanliness, mutans streptococciamong a group of boys with beta thalassemia majorin comparison with a control group. Materials and Methods: The study involved 30 boys with BTM aged 10-12 years compared to 30 healthy boys with the same age group. d1-4mfs and D1-4 MFS indices were applied (Muhlemann, 1976), the viable counts of mutans streptococci in stimulated saliva were also determined. Results: The entire thalassemic group was caries-active. For both dentitions, a higher dmfs/DMFS values were recorded for study compared to control group, difference was

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
The Relation of IGF-1 and Insulin Resistance in a Sample of Iraqi Obese Type 2 Diabetic Patients with Macrovascular Disease
...Show More Authors

Type 2 diabetes mellitus(T2DM) is a metabolic disease that is associated with an increased risk for atherosclerosis by 2-4 folds than in non- diabetics. In general population, low IGF-1 has been associated with higher prevalence of cardiovascular disease and mortality .This study aims to find out the relationship between IGF-1 level and other biochemical markers such as Homeostasis Model Assessment insulin resistance(HOMAIR) and Body Mass Index(BMI) in type 2 diabetic patients . This study includes (82) patients (40 females and 42 males) with age range (40-75) years,(34) non obese diabetic patients and (48) obese diabetic patients. The non obese individuals considered

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 30 2021
Journal Name
College Of Islamic Sciences
What Imam Ibn al-Subki disagreed with Imam al-Amadi in Tashnif al-Masma’, the chapter on analogy as a model
...Show More Authors

Takbiratul Ehram "The First Takbeer to Start Prayer" means: the words that the worshiper says to start his prayers, and refrain from anything invalidates it. the findings revealed that the four school jurists agreed that the prayer is not valid without Takbiratul Ehram "The First Takbeer to Start Prayer", and they disagreed on its description, so the majority of jurists said that it is a pillar, and some of them called it an obligatory, but Hanafi made it a condition. Likewise, the four jurists agreed that the one who articulates Takbiratul Ehram "The First Takbeer to Start Prayer" with the word: “Allahu Akbar,”; his Takbeer is correct, and they disagreed about the one who adds a word, or replaced it with another, where the m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
Factors associated with the phenomenon of marriage outside the court And the consequences of it A field study in Sadr City
...Show More Authors

Marriage outside the court is a manifestation of the oppression that women are subjected to in Iraq its seriousness comes out of the consequences that it leads to The. It overlooks the age of the girl and her marriage in younger age or coerced to marry as it leads to neglecting the affordability of marital relationship as long as the marriage does not have any legal or material consequences. The present study aims to detect Characteristics of both wives, husbands and families Who agree to marry her daughters outside the court. And the reasons that lead them to marry outside the courts. It also aims to provide information on the circumstances of marriage and reasons for refusing to ratify it in court. The study was based on the sample soc

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Text Classification Based on Weighted Extreme Learning Machine
...Show More Authors

The huge amount of documents in the internet led to the rapid need of text classification (TC). TC is used to organize these text documents. In this research paper, a new model is based on Extreme Machine learning (EML) is used. The proposed model consists of many phases including: preprocessing, feature extraction, Multiple Linear Regression (MLR) and ELM. The basic idea of the proposed model is built upon the calculation of feature weights by using MLR. These feature weights with the extracted features introduced as an input to the ELM that produced weighted Extreme Learning Machine (WELM). The results showed   a great competence of the proposed WELM compared to the ELM. 

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
GNSS Baseline Configuration Based on First Order Design
...Show More Authors

The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution  of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.

FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic

... Show More
View Publication
Publication Date
Sun Sep 11 2022
Journal Name
Electronics
IoT-Based Motorbike Ambulance: Secure and Efficient Transportation
...Show More Authors

The predilection for 5G telemedicine networks has piqued the interest of industry researchers and academics. The most significant barrier to global telemedicine adoption is to achieve a secure and efficient transport of patients, which has two critical responsibilities. The first is to get the patient to the nearest hospital as quickly as possible, and the second is to keep the connection secure while traveling to the hospital. As a result, a new network scheme has been suggested to expand the medical delivery system, which is an agile network scheme to securely redirect ambulance motorbikes to the nearest hospital in emergency cases. This research provides a secured and efficient telemedicine transport strategy compatible with the

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
Face-based Gender Classification Using Deep Learning Model
...Show More Authors

Gender classification is a critical task in computer vision. This task holds substantial importance in various domains, including surveillance, marketing, and human-computer interaction. In this work, the face gender classification model proposed consists of three main phases: the first phase involves applying the Viola-Jones algorithm to detect facial images, which includes four steps: 1) Haar-like features, 2) Integral Image, 3) Adaboost Learning, and 4) Cascade Classifier. In the second phase, four pre-processing operations are employed, namely cropping, resizing, converting the image from(RGB) Color Space to (LAB) color space, and enhancing the images using (HE, CLAHE). The final phase involves utilizing Transfer lea

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF