Preferred Language
Articles
/
joe-847
Demand Priority in a Power System With Wind Power Contribution Load Shedding Scheme Based
...Show More Authors

The load shedding  scheme has been extensively implemented as a fast solution for unbalance conditions. Therefore, it's crucial to investigate supply-demand balancing in order to protect the network from collapsing and to sustain stability as possible, however its implementation is mostly undesirable. One of the solutions to minimize the amount of load shedding is the integration renewable energy  resources, such as wind power, in the electric power generation could contribute significantly to minimizing power cuts as it is ability to positively improving the stability of the electric grid. In this paper propose a method for shedding the load base on the priority demands with incorporating the wind power generated. The higher priority demands are fed with a reliable wind energy resource in order to protect them from shedding under contingency condition such as high overloading by the real time monitoring of the network accompanied with power reducing for the lower priority demands. The simulation results prove effectiveness and practicality of the applied method paving the way for possible applications in power systems.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Mon Jan 26 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Sonographic assessment of normal cervical lymph nodes in a sample of Syrian population
...Show More Authors

Background: Sonographic examination is an important tool in assessment of normal and abnormal cervical lymph nodes. The aim of the study is to assess the distribution and the characteristic features of normal cervical lymph nodes in a sample of Syrian population. Materials and Methods: Fifty healthy Syrian subjects (25 men and 25 women) with an age of 20 -60years old, who had their cervical lymph nodes examined by ultrasound. Three hundred and two lymph nodes were detected. Lymph nodes were evaluated for their number, size, site, echogenic hilus, shape, as well as for the border sharpness. The subjects were categorized by age into four groups, (20 -30, 31 - 40 , 41 - 50 , 51- 60 years ). Statistical analysis of data was done using SP

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Advances In Language And Literary Studies Journal
A Rhetorico-Cultural Study of Preface Sections in English and Arabic Linguistics Books
...Show More Authors

Publication Date
Tue Sep 29 2020
Journal Name
International Journal Of Innovation, Creativity And Change
A Pragma-Linguistic Study of Deontic Modals in the Language of International Contracts.
...Show More Authors

Deontic modality expresses what is necessary or possible according to the norms of morality and laws of community. It is a cover term for those cases where modal auxiliaries used to express notions like ''obligation'', ''prohibition'' and, ''permission''. Deontic modals are basically performatives, having the ''so-be-it'' component of directives in that the speaker directs the behavior of the addressee to get things done. The present study identifies the use of deontic models in international contracts to prove that there are major pragmatic strategies employed in writing them. To achieve the aim of the study, a modified model of Danet’s (1980) and Trosborg’s (1995) in accordance to Searle (1969) is used to analyze 16 texts selected fro

... Show More
Publication Date
Fri Jan 12 2024
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Are Newly Graduated Pharmacists Competent to Perform Adequately in Hospitals? A Qualitative Study
...Show More Authors

Objectives: To assess the qualifications and performance of newly graduated pharmacists and explore factors that affect their performance in public hospitals. Methods: This qualitative study included face-to-face, semi-structured interviews with hospital practitioner pharmacists. It was conducted between March and May 2023 in Kerbala province, Iraq. The participating pharmacists were selected purposefully because they had three or more years of work experience at governmental hospitals. The audio-recording interviews were transcribed. Thematic analyses were used to generate themes and subthemes from the interviews. Results: Twenty-seven hospital pharmacists participated in this study. The study found that there are several factors t

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
A Pragmatic Analysis of the Use of Intensifiers in Charles Dickens’ Hard Times
...Show More Authors

The present study investigates the use of intensifiers as linguisticdevices employed by Charles Dickens in Hard Times. For ease of analysis, the data are obtained by a rigorous observation of spontaneously occurring intensifiers in the text. The study aims at exploring the pragmatic functions and aesthetic impact of using intensifiers in Hard Times.The current study is mainly descriptive analytical and is based on analyzing and interpreting the use of intensifiers in terms ofHolmes (1984) andCacchiani’smodel (2009). From the findings, the novelist overuses intensifiers to the extent that 280 intensifiers are used in the text. These intensifiers(218) are undistinguished

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 29 2017
Journal Name
College Of Islamic Sciences
Qur'anic contextual integration of the end of heaven: (a study in scientific interpretation)
...Show More Authors

In The Name of Allah Most Gracious Most Merciful

This is a study dedicated to explaining the conditions of the end of heaven, stage by stage; And to draw the final picture of it, through the facts of the Qur’an, and to make the contextual integration of the verses of the end of heaven, and their arrangement in an intentional arrangement, a path that guides us to knowing the integrated picture of it on the Day of Resurrection, according to scientific interpretation.

The importance and usefulness of the research lies in:

Extracting the order of the stages of the end of heaven, from its first state to its last, which came in separate verses of the Qur’an, each one of which was placed in a surah that was consistent w

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 15 2019
Journal Name
Alustath Journal For Human And Social Sciences
A Developmental-Longitudinal Study of Request External Modifiers in Authentic and Elicited Data
...Show More Authors

View Publication
Crossref
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
Notes on Traces of a Symmetric Generalized (?, ?)-Biderivations and Commutativity in Prime Rings
...Show More Authors

Let R be a 2-torision free prime ring and ?, ?? Aut(R). Furthermore, G: R×R?R is a symmetric generalized (?, ?)-Biderivation associated with a nonzero (?, ?)-Biderivation D. In this paper some certain identities are presented satisfying by the traces of G and D on an ideal of R which forces R to be commutative

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Theory And Practice In Language Studies
Constructing Carcinogen Risk in Scientific Discourse Through Ideological Conflict: A Cognitive Pragmatic Analysis
...Show More Authors

With the increasing rates of cancer worldwide, a great deal of scientific discourse is devoted to arguments and statements about cancer and its causes. Scientists from different fields try to seize any available chance to warn people of the risk of consuming and exposing to carcinogens that have, unfortunately, become essential parts of modern life. The present paper attempts to investigate the proximization strategy through which scientists construct carcinogen risk to enhance people’s preventive actions against these carcinogens. The paper targets the construction which depends on producing the conflict between the values of the people themselves and the contrasting values assigned to carcinogens. To achieve this aim, Cap’s (2

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref