Preferred Language
Articles
/
tRYABYcBVTCNdQwCIC1I
MODELS, DETECTION METHODS, AND CHALLENGES IN DC ARC FAULT: A REVIEW
...Show More Authors

The power generation of solar photovoltaic (PV) technology is being implemented in every nation worldwide due to its environmentally clean characteristics. Therefore, PV technology is significantly growing in the present applications and usage of PV power systems. Despite the strength of the PV arrays in power systems, the arrays remain susceptible to certain faults. An effective supply requires economic returns, the security of the equipment and humans, precise fault identification, diagnosis, and interruption tools. Meanwhile, the faults in unidentified arc lead to serious fire hazards to commercial, residential, and utility-scale PV systems. To ensure secure and dependable distribution of electricity, the detection of such hazards is crucial in the early phases of the distribution. In this paper, a detailed review of modern approaches for the identification of DC arc faults in PV is presented. In addition, a thorough comparison is performed between various DC arc-fault models, characteristics, and approaches used for the identification of the faults.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions
...Show More Authors

Sensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte

... Show More
Scopus (54)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions
...Show More Authors

Scopus (54)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Computers, Materials & Continua
Credit Card Fraud Detection Using Improved Deep Learning Models
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Fri Dec 11 2020
Journal Name
2020 Ieee 8th Conference On Systems, Process And Control (icspc)
A Survey of Different DC Faults in a Solar Power System
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Current Pharmaceutical Analysis
Analytical Methods for the Identification of Pigments in Tattoo Inks and Some of Their Physiological Side Effects: A Review
...Show More Authors

In this review, numerous analytical methods to distinguish pigments in tattoo, paint, and ink items are discussed. The selection of a method was dependent upon the purpose, e.g., quantification or identification of pigments. The introductory part of this review focuses on describing the importance of setting up a pigment-associated safety profile. The formation of different degradation chemical substances as well as impurity trends can be indicated through the chemical investigation of pigments in tattoo products. It is noteworthy that pigment recognition in tattoo inks can work as a preliminary method to identify the pigments in a patient's tattoo before being removed by laser therapy. Contrary to the stud

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Current Pharmaceutical Analysis
Analytical Methods for the Identification of Pigments in Tattoo Inks and Some of Their Physiological Side Effects: A Review
...Show More Authors

In this review, numerous analytical methods to distinguish pigments in tattoo, paint, and ink items are discussed. The selection of a method was dependent upon the purpose, e.g., quantification or identification of pigments. The introductory part of this review focuses on describing the importance of setting up a pigment-associated safety profile. The formation of different degradation chemical substances as well as impurity trends can be indicated through the chemical investigation of pigments in tattoo products. It is noteworthy that pigment recognition in tattoo inks can work as a preliminary method to identify the pigments in a patient's tattoo before being removed by laser therapy. Contrary to the stud

... Show More
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Some Robust methods for Estimates the power Spectrum in ARMA Models Simulation Study
...Show More Authors

Abstract:

Robust statistics Known as, resistance to errors caused by deviation from the stability hypotheses of the statistical operations (Reasonable, Approximately Met, Asymptotically Unbiased, Reasonably Small Bias, Efficient ) in the data selected in a wide range of probability distributions whether they follow a normal distribution or a mixture of other distributions deviations different standard .

power spectrum function lead to, President role in the analysis of Stationary random processes, form stable random variables organized according to time, may be discrete random variables or continuous. It can be described by measuring its total capacity as function in frequency.

<

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 29 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Food problem in Iraq: Challenges and Antiquities.: Food problem in Iraq: Challenges and Antiquities.
...Show More Authors

Research Hypothesis from the fact that kicks off the effect that agricultural production in Iraq plays an important role in overcoming the food problem and achieving food security, but he became far far away from the provision of sufficient quantities of food products and then securing the Iraqi consumer food basket by the challenges faced by the agricultural sector.
To prove the hypothesis research in its structure in three axes came, the first axis eating historical significance to the subject of food over time periods as well as to clarify the concept of food security, and the second axis touched on the most important challenges facing the agricultural sector in Iraq and prevent the achievement of food requirements for members of

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Review of Smishing Detection Via Machine Learning
...Show More Authors

     Smishing is a cybercriminal attack targeting mobile Short Message Service (SMS) devices that contains a malicious link, phone number, or email. The attacker intends to use this message to steal the victim's sensitive information, such as passwords, bank account details, and credit cards. One method of combating smishing is to raise awareness and educate users about the various tactics used by SMS phishers. But even so, this method has been criticized for becoming inefficient because smishing tactics are continually evolving. A more promising anti-smishing method is to use machine learning. This paper introduces a number of machine learning algorithms that can be used for detecting smishing. Furthermore, the differences and simil

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref