The load shedding scheme has been extensively implemented as a fast solution for unbalance conditions. Therefore, it's crucial to investigate supply-demand balancing in order to protect the network from collapsing and to sustain stability as possible, however its implementation is mostly undesirable. One of the solutions to minimize the amount of load shedding is the integration renewable energy resources, such as wind power, in the electric power generation could contribute significantly to minimizing power cuts as it is ability to positively improving the stability of the electric grid. In this paper propose a method for shedding the load base on the priority demands with incorporating the wind power generated. The higher priority demands are fed with a reliable wind energy resource in order to protect them from shedding under contingency condition such as high overloading by the real time monitoring of the network accompanied with power reducing for the lower priority demands. The simulation results prove effectiveness and practicality of the applied method paving the way for possible applications in power systems.
This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreStrives Total Productive Maintenance to increase the overall effectiveness of the equipment through the early involvement in the design and manufacture of equipment productivity. It also operates in an environment of simultaneous engineering work on the synchronization of activities to take advantage of early information by maintenance engineers, design, operation, and that helps to reduce the faults and facilitate future maintenance tasks.
Has adopted a search in the theoretical concept of the total maintenance productivity and concurrent engineering activities carried out during which the conjunction a
... Show MoreThe evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities. Cloud computing can be used to store big data. The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r
... Show MoreIraq, home of the Tigris and Euphrates rivers, has survived an extreme deficiency of surface water assets over the years. The gap is due to the decline of the Iraqi water share every year, as well as a high demand for water use from different sectors, particularly agriculture.
Dam development has long given significant economic benefits to Iraq in circulating low‐priced electricity and supporting low‐income farmers by supplying them with a free irrigation system (Zakaria et al, 2012). This encouraged domestic consumption and investment.
Despite the fact that numerous advantages are expected from dam construction, it should be painstakingly assessed, utilizing cost
There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show MoreThis research aims to study the influence of organizational power on the achievement of entrepreneurship for business organizations. It is an analytical study of the views of a sample of managers in the Iraqi Ministry of Education. The research highlights the contribution that can be made from the knowledge of the theory of business organizations in achieving organizational success. The organizational power of the organization contributes to achieving entrepreneurship in the business environment and achieving a competitive position in the work environment. The research dealt with two variables: the first is the independent variable, the organizational power in its dimensions (Expend Power, Structural Power, Prestige Power). And t
... Show MoreFear, harvesting, hunting cooperation, and antipredator behavior are all important subjects in ecology. As a result, a modified Leslie-Gower prey-predator model containing these biological aspects is mathematically constructed, when the predation processes are described using the Beddington-DeAngelis type of functional response. The solution's positivity and boundedness are studied. The qualitative characteristics of the model are explored, including stability, persistence, and bifurcation analysis. To verify the gained theoretical findings and comprehend the consequences of modifying the system's parameters on their dynamical behavior, a detailed numerical investigation is carried out using MATLAB and Mathematica. It is discovered that the
... Show MoreIraq is highly dependent on international markets to provide food for its residents. As imported food prices are highly dependent on crude oil prices in global markets, any shock in oil prices will have an impact on food consumption in the country. As a result, it is essential to study the demand for imported food at every time period. To the best of our knowledge as researchers, as not even a single study is available in the literature, this paper is considered the first to study the demand for imported food groups in Iraq. Therefore, the main objective of this research is to estimate demand elasticities for several imported food categories in Iraq. This study uses an Almost Ideal Demand System model to analyze the demand for imported f
... Show MoreRecommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n
... Show More