Solar photovoltaic (PV) has many environmental benefits and it is considered to be a practical alternative to traditional energy generation. The electrical conversion efficiency of such systems is inherently limited due to the relatively high thermal resistance of the PV components. An approach for intensifying electrical and thermal production of air-type photovoltaic thermal (PVT) systems via applying a combination of fins and surface zigzags was proposed in this paper. This research study aims to apply three performance enhancers: case B, including internal fins; case C, back surface zigzags; and case D, combinations of fins and surface zigzags; whereas the baseline smooth duct represents case A. A 2D, steady-state simulation model that took into account the impact of the convective flow of air circulating inside the PVT system in addition to radiative and convective heat losses from the front PV surface was developed and validated via previous tests. The results revealed that, under the same volume requirements, the application of surface zigzags is preferred for airflow rates of 0.06 kg/s or less, whereas the introduction of fins is preferred for higher airflow rates. The results also revealed that, of the three cases considered, the introduction of the fin–surface zigzag combination is the most effective and has the potential to improve the electrical and thermal efficiency by ~26% and 3%, respectively.
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Gastroesophageal reflux disease (GERD) is a prevalent clinical condition, that affects millions of individuals worldwide. Objective: To assess the level of soluble HLA-E (sHLA-E) as a biomarker in the diagnosis and immunopathogenesis of GERD patients. Methods: The case-control prospective study included 40 GERD patients who were consulted at the Gastroenterology Unit of AlKindy Teaching Hospital, as along with 40 healthy control subjects. The study period extended from January 2023 to May 2024. Blood was drawn from both groups and serum was separated to assesssHLA-E using a sandwich enzyme-linked immunosorbent assay (ELISA) kit. Results: There was a statistically significant difference in sHLA-E levels between GERD patients and healthy cont
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThe current study introduces a novel method for calculating the stability time by a new approach based on the conversion of degradation from the conductivity curve results obtained by the conventional method. The stability time calculated by the novel method is shorter than the time measured by the conventional method. The stability time in the novel method can be calculated by the endpoint of the tangency of the conversion curve with the tangent line. This point of tangency represents the stability time, as will be explained in detail. Still, it gives a clear and accurate envisage of the dehydrochlorination behavior and can be generalized to all types of polyvinyl chloride compared to the stability time measured by conventional ones based
... Show MoreIn this work a novel drug delivery system through modification of poly acrylic acid with Methionine as a spacer between the poly acrylic acid which was converted to its acyl chloride and reacted with Methionine as spacer unit which has been reacted with Ampicillin drug. In vitro drug release study had been conducted successfully in basic medium in pH 7.4 and acidic medium in pH 1.1 at 37?. Due to many problems associated with drug release and, this modification could decrease the side effect of drug. The prepared prodrug polymer was characterized by spectra method [FTIR and 1H?NMR]. Physical properties and intrinsic viscosity of drug polymer were determined. The good results were obtained in the presence of spacer unit with compar
... Show MoreThe essence of the new work in the satellite TV channels is to provide news coverage of news that will inform the people of what is going on around them in order to increase their political, social, economic and cultural awareness and this drives them to take positions or certain behaviors on according to what the communicator in these channels wants. News and news reports are generally used as a psychological variable to influence public opinion and does not offer interestingness and information. Therefore, satellite TV channels have assumed special attention towards their correspondents desiring to achieve scoop in news coverage and to have the final word in reading events and install it
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show More