The load shedding scheme has been extensively implemented as a fast solution for unbalance conditions. Therefore, it's crucial to investigate supply-demand balancing in order to protect the network from collapsing and to sustain stability as possible, however its implementation is mostly undesirable. One of the solutions to minimize the amount of load shedding is the integration renewable energy resources, such as wind power, in the electric power generation could contribute significantly to minimizing power cuts as it is ability to positively improving the stability of the electric grid. In this paper propose a method for shedding the load base on the priority demands with incorporating the wind po
... Show MoreThis work is the first study of the Curculionoidea fauna from Kurdistan region of Iraq, based on the intensive survey in different localities of Kurdistan from March 2016 to November 2017. In total, 41 species belonging to 28 genera, 21 tribes and 3 families were collected and identified, including 25 species newly recorded for the Iraqi fauna.
General distribution, collecting localities and methods, with plant association data for each species are given.
Abstract
This paper discusses the essence of the developmental process in auditing firms and offices at the world today. This process is focused on how to adopt the audit concepts which is based on Information and Communication Technology (ICT), including the Continuous Auditing (CA) in particular. The purpose of this paper is to design a practical model for the adoption of CA and its requirements according to the Technology Acceptance Model (TAM). This model will serve as a road map for manage the change and development in the Iraqi auditing firms and offices. The paper uses the analytical approach in reaching to the target results. We design the logical and systematic relations between the nine variable
... Show MoreBackground: Oral SCC is a complex malignancy where environmental factors, viral infections and genetic alterations most likely interact, and thus give rise to the malignant condition. The HSP70 play a direct role in apoptosis inhibition by aligning the improved integrity of a cell’s proteins with the improved chances of that particular cell’s survival.P21 gene produces p21 protein which is a potent cyclin-dependent kinase inhibitor that plays a significant role in carcinogenesis. The aims of the study were to evaluate and compare the immun-histochemical expression of the HSP70 and cell cycle protein p21in NOM, OED, and OSCC. Correlate both marker expressions with each other. Materials and methods: Forty six formalin-fixed, par
... Show MoreIn this study, condensation polymerization was used to synthesize a number of novel liquid crystal polymers with 1,3,4-oxadiazole rings based on melamine. The new synthesized polymers were characterized by Fourier transform infrared (FTIR) and proton nuclear magnetic resonance (1HNMR) spectroscopy. Differential scanning calorimetry (DSC) and optical polarization microscopy (OPM) were used to investigate their liquid crystalline properties. The results demonstrated that throughout a wide temperature range, most of the polymers exhibited columnar (CohX) and nematic (N) liquid crystalline phases.
Collapse of the vapor bubble condensing in an immiscible is investigated for n-pentane and n-hexane vapors condensing in cold water and n-pentane in two different compositions of glycerin- water mixture. The rise velocity and the drag coefficient of the two-phase bubble are measured.
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More<span lang="EN-US">The need for robotics systems has become an urgent necessity in various fields, especially in video surveillance and live broadcasting systems. The main goal of this work is to design and implement a rover robotic monitoring system based on raspberry pi 4 model B to control this overall system and display a live video by using a webcam (USB camera) as well as using you only look once algorithm-version five (YOLOv5) to detect, recognize and display objects in real-time. This deep learning algorithm is highly accurate and fast and is implemented by Python, OpenCV, PyTorch codes and the Context Object Detection Task (COCO) 2020 dataset. This robot can move in all directions and in different places especially in
... Show More