The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Inspired by the IEEE training course “Stuff You Didn't Learn in Engineering School”, IEEE ComSoc Iraq Chapter team prepared a one full day workshop at (17 Dec 2013) for the engineering students in Technical College of Mosul (TCoM) titled “Essential Soft Skills for Engineers”, within the activities of ICECCPCE13.
The Lecture Provides a breief Knowledge about the Microprocessor Evolution, taking into considerations the Microprocessor history, and different types of microprocessors and parallel processing aspect. Aso a brief introduction to data movement instructions. With the history of Microprocessor the lecture stops with the followings: INTEL 4004; INTEL 4040; INTEL 8008; INTEL 8080; INTEL 8085; INTEL 8086;...
Diversity factor of a group of consumers is Known as the sum of the maximum load for each consumer divided by the maximum drawn load in each consumer. The synchronous factor is the reciprocal of the diversity factor. The same definition repeated when dealing with different parts of the distribution system, transformers and feeders. This factor is important for the economic planning of the distribution...
FPGAs are pre-fabricated silicon devices that can be electrically programmed to become almost any kind of digital circuit or system. They provide a number of compelling advantages over ASIC technologies. ASICs typically take months to fabricate and cost hundreds of thousands to millions of dollars to obtain the first device; FPGAs are configured in less than a second (and can often be reconfigured...
To reach the high depths of knowledge and expertise which are required nowadays, scientists focus their attention on minute areas of study. However, the most complex problems faced by scientists still need the application of different disciplines to tackle them, which creates a necessity for multi-disciplinary collaboration. Cryptology is naturally multidisciplinary field, drawing techniques from...
Rural and remote sites electrification, where national grid is almost impossible because of cost and geographical hurdle, is nowadays an important market for renewable energy based electricity production systems. This paper presents analyzing wind data from 5 masts using Scilab programming software calculating power densities by relative and Weibull density function, and designing hybrid power system...
Embedded design Techniques are effective tools for configuring a processor system on field programmable gate arrays that can be adapted to function according to the designer target. One of the most outstanding application is to accommodate the embedded designed system to deal with digital signal processing techniques to be used in different practical applications especially in speech and image processing...
This paper presents a modified line injection technique to reduce the input line current harmonics generated by three-phase AC/DC rectifiers. In conventional harmonic current injection method the optimum harmonic current reduction is obtained when (root mean square) (rms) value of the injection third harmonic current equals the DC load current. Therefore the power diode peak current is increased by...
In this paper, an efficient control algorithm for infrared (IR) sensor based camera monitoring system is proposed. The aim of this algorithm is to detect and record the state of the motioned objects that cross the covered area by the monitoring scheme, in which both consumed power and storage capacity are reduced. This is done by controlling the work of the allocated cameras to operate independently...
Process migration involves transferring both static and dynamic states of a process from one machine to another. Migration requires checkpointing the dynamic states of a process, including the process address space, and storing them as files on source machine hard disk. Transferring the checkpointed information needs establishing a network connection, accessing the disk, reading files contents and...
The presented paper investigates a new design of an adaptive single phase auto reclosing (ASPAR) single scheme using fuzzy logic (FL) algorithm to maintain synchronism and improvement of the power system reliability, integrity and stability. The suggested auto-reclosure system has been incorporated with distance measuring relay (DMR) to detect and diagnose fault occurrence. The proposed fault classification...
A neuro-fuzzy controller designed for sensorless speed control of DC motor is presented in this paper. Artificial Neural network is used to solve the problem of tuning a fuzzy logic controller. The neuro-fuzzy controller uses neural network learning technique for tuning membership functions and setting the rule base from the simple data provided to estimate the DC motor speed. The speed of DC motor...
In wireless broadband communications using single-carrier interleave division multiple access (SC-IDMA) with frequency domain equalization (FDE), a new combination of iterative block decision feedback equalization (IBDFE) and interference cancellation (IC) techniques is proposed to deal with several users accessing the common channel. Filtering operations of IBDFE, which are used to remove intersymbol...
In this paper, a method to improve the security level of advanced encryption standard (AES) algorithm is proposed. The proposed algorithm, which is based on the standard AES, increases the complexity of the encryption process leading to a more difficultness against attacking and decryption of the plaintext without using the correct encryption key. The research investigates the AES algorithm with regard...
Synthesis of wide beam array antennas is investigated using phase-only excitations for uniform amplitude array. In this approach random phase distribution is proposed. Symmetrical and asymmetrical distributions of the random phase are considered. The obtained patterns are assessed by comparing beam width and maximum level of the radiated field with those obtainable from the conventional broadside...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.