The objective of an Optimal Power Flow (OPF) algorithm is to find steady state operation point which minimizes generation cost, loss etc. while maintaining an acceptable system performance in terms of limits on generators real and reactive powers, line flow limits etc. The OPF solution includes an objective function. A common objective function concerns the active power generation cost. A Linear programming method is proposed to solve the OPF problem. The Linear Programming (LP) approach transforms the nonlinear optimization problem into an iterative algorithm that in each iteration solves a linear optimization problem resulting from linearization both the objective function and constrains. A computer program, written in MATLAB environme
... Show MoreMultiple linear regressions are concerned with studying and analyzing the relationship between the dependent variable and a set of explanatory variables. From this relationship the values of variables are predicted. In this paper the multiple linear regression model and three covariates were studied in the presence of the problem of auto-correlation of errors when the random error distributed the distribution of exponential. Three methods were compared (general least squares, M robust, and Laplace robust method). We have employed the simulation studies and calculated the statistical standard mean squares error with sample sizes (15, 30, 60, 100). Further we applied the best method on the real experiment data representing the varieties of
... Show MoreCoronavirus disease (COVID-19) is an acute disease that affects the respiratory system which initially appeared in Wuhan, China. In Feb 2019 the sickness began to spread swiftly throughout the entire planet, causing significant health, social, and economic problems. Time series is an important statistical method used to study and analyze a particular phenomenon, identify its pattern and factors, and use it to predict future values. The main focus of the research is to shed light on the study of SARIMA, NARNN, and hybrid models, expecting that the series comprises both linear and non-linear compounds, and that the ARIMA model can deal with the linear component and the NARNN model can deal with the non-linear component. The models
... Show MoreThe research discusses the need to find the innovative structures and methodologies for developing Human Capital (HC) in Iraqi Universities. One of the most important of these structures is Communities of Practice (CoPs) which contributes to develop HC by using learning, teaching and training through the conversion speed of knowledge and creativity into practice. This research has been used the comparative approach through employing the methodology of Data Envelopment Analysis (DEA) by using (Excel 2010 - Solver) as a field evidence to prove the role of CoPs in developing HC. In light of the given information, a researcher adopted on an archived preliminary data about (23) colleges at Mosul University as a deliberate sample for t
... Show MoreThe valley Dwiridj of drainage basins task that lies east of Iraq and thus we have in this study the application of tow models athletes on the three basins of the valley to get Mor e values accurate to Estimate the volume of runoff and peak discharge and time climax and through the use of Technology remote sensing (GIS),has been show through the application of both models, that the maximum value for the amount of Dwiridj valley of (1052/m3/s) According to Equation (SCS-CN) and about (1370.2/m3/s)by approach (GIUH) that difference is the amount of discharge to the Equation (SCS-CN) ar not accurate as(GIUH) approaches Equation ecalling the results of the Field ces Department of damand reservoirs that the volume of runoff to the valley wase
... Show More(Use of models of game theory in determining the policies to maximize profits for the Pepsi Cola and Coca-Cola in the province of Baghdad)
Due to the importance of the theory of games especially theories of oligopoly in the study of the reality of competition among companies or governments and others the researcher linked theories of oligopoly to Econometrics to include all the policies used by companies after these theories were based on price and quantity only the researcher applied these theories to data taken from Pepsi Cola and Coca-Cola In Baghdad Steps of the solution where stated for the models proposed and solutions where found to be balance points is for the two companies according to the princi
... Show MoreThe developments accelerated in technology and rapid changes in the environment and increase numbers industrial countries and different desires and requirements of customers, lead to be produced in large quantities is not feasible due to changes listed above as well as the need to product variety and change in tastes and desires of consumers, all above led not to enable companies to discharge their products in the case of mass production and created the need to devise ways and new methods fit with the current situation, and accounting point no longer the traditional accounting systems able to meet the requirements needed by the companies to make decisions and know where waste and loss of resources resulting to invent new style away from
... Show MoreFree Radical Copolymerization of Styrene/ Methyl Methacrylate were prepared chemically under Nitrogen ,which was investigated, in the present of Benzoyl Peroxide as Initiator at concentration of 2 × 10-3 molar at 70 °C, which was carried out in Benzene as solvent to a certain low conversion . FT-IR spectra were used for determining of the monomer reactivity ratios ,which was obtained by employing the conventional linearization method of Fineman-Ross (F-R) and Kelen-Tüdos (K- T). The experimental results showed the average value for the Styrene r1 / Methyl Methacrylate r2 system, Sty r1 = 0.45 , MMA r2 = 0.38 in the (F–R) Method and r1 = 0.49 , r2 = 0.35 in the (K–T) Method, The Results of this indicated show the random distri
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show More