Now-a-days the Flexible AC Transmission Systems (FACTS) technology is very effective in improving the power flow along the transmission lines and makes the power system more flexible and controllable. This paper deals with the most robust type of FACTS devices; it’s a Unified Power Flow Controller (UPFC). Many cases have been taken to study how the system behaves in the presence and absence of the UPFC under normal and contingency conditions. The UPFC is a device that can be used to improve the bus voltage, increasing the loadability of the line and reduce the active and reactive power losses in the transmission lines, through controlling the flow of real and reactive power. Both the magnitude and the phase angle of the voltage can be varied independently. The steady state model of UPFC has been adopted on IEEE-30 bus test system and simulated using MATLAB programming language. Newton Raphson (NR) numerical analysis method has been used for solving the load flow of the system. The practical part has been solved through Power System Simulation for Engineers (PSS\E) software Version 32.0. The Comparative results between the experimental and practical parts obtained from adopting the UPFC where too close and almost the same under different loading conditions, which are (5%, 10%, 15% and 20%) of the total load.
The research aimed to demonstrate the possibility of benefiting from the coordination between real estate and income tax as the independent variable on the tax outcome as the dependent variable as the dependent variable. Which were practiced within rented buildings, as information was obtained from real estate owners, and the annual controls for the year 2021 were relied upon in the process of calculating the tax amounts expected to be obtained. used in the tax inventory process lacks seriousness and continuous updating
Followers and their followers (may Allah be pleased with them all) followed the approach of the guidance and the Sunnah of the Messenger of Allah Muhammad (peace be upon him) in the collection and codification of the hadith of the Prophet Muhammad in various Arab and Islamic areas. Subsequent judge Faqih Abu Bakr al-Ansari had a distinct effect during that time immortalized in the pages of our Islamic history in preserving the Sunnah of our great Prophet Muhammad (PBUH) and documenting the constants of Sharia and Islamic jurisprudence and its importance in the activity of intellectual and scientific movement in the Arab Islamic State.
The world is currently challenging the serious effects of the pandemic of the Coronavirus disease (COVID-19) caused by severe acute respiratory syndrome Coronavirus 2 (SARS-CoV-2). Data on pediatric COVID are rare and scattered in the literature. In this article, we presented the updated knowledge on the pediatric COVID-19 from different aspects. We hope it will increase the awareness of the pediatricians and health care professionals on this pandemic.
Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables