Single-Phase Grid-Tied Transformerless Inverter of Zero Leakage Current for PV System
...Show More Authors
The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreA perturbed linear system with property of strong observability ensures that there is a sliding mode observer to estimate the unknown form inputs together with states estimation. In the case of the electro-hydraulic system with piston position measured output, the above property is not met. In this paper, the output and its derivatives estimation were used to build a dynamic structure that satisfy the condition of strongly observable. A high order sliding mode observer (HOSMO) was used to estimate both the resulting unknown perturbation term and the output derivatives. Thereafter with one signal from the whole system (piton position), the piston position make tracking to desire one with a simple linear output feedback controller after ca
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreThe purpose of this article was to identify and assess the importance of risk factors in the tendering phase of construction projects. The construction project cannot succeed without the identification and categorization of these risk elements. In this article, a questionnaire for likelihood and impact was designed and distributed to a panel of specialists to analyze risk factors. The risk matrix was also used to research, explore, and identify the risks that influence the tendering phase of construction projects. The probability and impact values assigned to risk are used to calculate the risk's score. A risk matrix is created by combining probability and impact criteria. To determine the main risk elements for the tender phase of
... Show MoreThe purpose of this article was to identify and assess the importance of risk factors in the tendering phase of construction projects. The construction project cannot succeed without the identification and categorization of these risk elements. In this article, a questionnaire for likelihood and impact was designed and distributed to a panel of specialists to analyze risk factors. The risk matrix was also used to research, explore, and identify the risks that influence the tendering phase of construction projects. The probability and impact values assigned to risk are used to calculate the risk's score. A risk matrix is created by combining probability and impact criteria. To determine the main risk elements for the tend
... Show MoreIn this paper, silicon carbonitried thin films were prepared by the method of photolysis of the silane (SiH4) and ethylene (C2H4) gases, with and without ammonia gas (NH3), which is represented by the ratio between the (PNH3) and (PSiH4 + PC2H4 + PNH3), (which assign by the letter X), X has the values (0, 0.13, 0.33). This method carried out by using TEA-CO2 laser, on glass substrate at (375 oC), deposition rate (0.416-0.833) nm/pulse thin film thickness of (500-1000) nm. The optical properties of the films were studied by using Absorbance and Transmittance spectrums in wavelength range of (400-1100) nm, the results showed that the electronic transitions is indirect and the energy gap for the SiCN films increase with increasing of nitrog
... Show MoreIn the age of information and communication revolution, education as one of life
aspects has influenced with that revolution by integrating technology in education, which
have become as an important learning tools of the whole educational process . Technology,
when used appropriately, can help make science classroom a site of active learning and
critical thinking, furthering student inquiry and connections with different materials. It is
necessary to develop human rights education programs and materials for discretionary and
extracurricular activities as it provide them with the skills and tools so that they are
empowered to take action to realize their rights. Human rights education is a critical means of
instill
Quantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.