Preferred Language
Articles
/
shY5jIcBVTCNdQwCdVWk
Power Efficiency Maximization in Cognitive Radio Networks
...Show More Authors

Cognitive radio technology is used to improve spectrum efficiency by having the cognitive radios act as secondary users to access primary frequency bands when they are not currently being used. In general conditions, cognitive secondary users are mobile nodes powered by battery and consuming power is one of the most important problem that facing cognitive networks; therefore, the power consumption is considered as a main constraint. In this paper, we study the performance of cognitive radio networks considering the sensing parameters as well as power constraint. The power constraint is integrated into the objective function named power efficiency which is a combination of the main system parameters of the cognitive network. We prove the existence of optimal combination of parameters such that the power efficiency is maximized. Then we reformulate the objective function to incorporate the throughput. According to different constraints or degree of significance, we may put proper weight to each term so that we could obtain more preferable combination of parameters. Computer simulations have given the optimal solution curve for different weights. We can draw the conclusion that if we put more emphasis on power efficiency, the transmit power is a more critical parameter, however if throughput is more important, the effect of sensing time is significant.

Scopus Crossref
View Publication
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Application of Wavelet Packet and S Transforms for Differential Protection of Power Transformer
...Show More Authors

The differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 14 2018
Journal Name
Journal Of Engineering
Optimum Design of Power System Stabilizer based on Improved Ant Colony Optimization Algorithm
...Show More Authors

This paper presents an improved technique on Ant Colony Optimization (ACO) algorithm. The procedure is applied on Single Machine with Infinite Bus (SMIB) system with power system stabilizer (PSS) at three different loading regimes. The simulations are made by using MATLAB software. The results show that by using Improved Ant Colony Optimization (IACO) the system will give better performance with less number of iterations as it compared with a previous modification on ACO. In addition, the probability of selecting the arc depends on the best ant performance and the evaporation rate.

 

View Publication Preview PDF
Publication Date
Sat Mar 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Reinforcement Steel Corrosion Reduction by Using Fly Ash from South Baghdad Power Plant
...Show More Authors

Corrosion- induced damage in reinforced concrete structure such as bridges, parking garages, and buildings, and the related cost for maintaining them in a serviceable condition, is a source of major concern for the owners of these structures.
Fly ash produced from south Baghdad power plant with different concentrations (20, 25 and 30) % by weight from the cement ratio were used as a corrosion inhibitor as a weight ratio from the cement content.
The concrete batch ratio under study was (1:1.5:3) cement, sand and gravel respectively which is used in Iraq. All the raw materials used were locally manufactured.
Concrete slabs (250x250x70) mm dimensions were casted, using Poly-wood molds. Two steel bars were embedded in the central po

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of a Power System Transient Stability Using Static Synchronous Series Compensator SSSC
...Show More Authors

Static Synchronous Series Compensator (SSSC) is a well known device for effectively regulating the active power flow in a power system. In this paper, the SSSC linearized power flow equations are incorporated into Newton-Raphson algorithm in a MATLAB written program to investigate the control of active poweer flow and the transient stability of a five bus and a thirty bus IEEE test systems, during abnormal conduction (three phase fault near buses). A comparison of the results obtained for the base case without SSSC and with it to investigate the effectiveness of the device on both of the active power flow and the transient stability.

View Publication Preview PDF
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Languages (jcl)
Formation of Orientalist discourse, the tendency within the force, and metadata, and power.
...Show More Authors

Began research of the foundations of Orientalist discourse based on force and metadata and authority, and the possibility of turning the West's view of the East as if made ​​radical changes in the structure of the West or in a relationship of power and authority between it and the east. We have adopted in our paper on the research categories of Edward Said and visions in the field of Orientalism in general, and especially his book entitled the name of this area, not forgetting, or leave the expansion to other sources, a researcher in this field, to enrich the research.

We went to Orientalism as a concept and based cognitive, and the work of the Orientalist, and the meanings of Orientalism, which suggests Balastala which was c

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Effect of Power He-Ne Laser on Growth of Dermatophyte Trichophyton mentagophytes
...Show More Authors

This study aims to evaluate the effect of low power a semi-conductor He-Ne laser 4 mw power with 635 nm length on the growth and cell viability of dermatophyte Trichophyton mentagophytes. For this study, skin samples of 22 patents were collecting; those patients were suffering from dematophytsis caused by the dermatophytes, three isolates were diagnosed in dermatophytes group were T. mentagophytes.  Results showed that rays of semi-conductor laser with 635 nm wavelength of 4 mn power have affected the fungal growth T. mentagophytes (the ideal isolates) in sold media when exposed to laser radiation in different periods of 10-20 second duration, but the other two isolates gave negative results. The effects of He-Ne laser rays in dry w

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 31 2013
Journal Name
Inventi Impact: Artificial Intelligence
SIMULATION OF IDENTIFICATION AND CONTROL OF SCARA ROBOT USING MODIFIED RECURRENT NEURAL NETWORKS
...Show More Authors

This paper presents a modified training method for Recurrent Neural Networks. This method depends on the Non linear Auto Regressive (NARX) model with Modified Wavelet Function as activation function (MSLOG) in the hidden layer. The modified model is known as Modified Recurrent Neural (MRN). It is used for identification Forward dynamics of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot. This model is also used in the design of Direct Inverse Control (DIC). This method is compared with Recurrent Neural Networks that used Sigmoid activation function (RS) in the hidden layer and Recurrent Neural Networks with Wavelet activation function (RW). Simulation results shows that the MRN model is bett

... Show More
View Publication
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Automatic Short Answer Grading System Based on Semantic Networks and Support Vector Machine
...Show More Authors

      In education, exams are used to asses students’ acquired knowledge; however, the manual assessment of exams consumes a lot of teachers’ time and effort. In addition, educational institutions recently leaned toward distance education and e-learning due the Coronavirus pandemic. Thus, they needed to conduct exams electronically, which requires an automated assessment system. Although it is easy to develop an automated assessment system for objective questions. However, subjective questions require answers comprised of free text and are harder to automatically assess since grading them needs to semantically compare the students’ answers with the correct ones. In this paper, we present an automatic short answer grading metho

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Intelligent Systems
Void-hole aware and reliable data forwarding strategy for underwater wireless sensor networks
...Show More Authors
Abstract<p>Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co</p> ... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref