To create a highly efficient photovoltaic-thermal (PV-T) system and maximise the energy and exergy efficiency, this study aims to propose an innovative configuration of a PV-T system comprising wavy tubes with twisted-tape inserts. Following the validation of a numerical model, a parametric study has been conducted to assess the geometrical effects of twisted tape and wavy tubes, as well as the coolant fluid type and velocity, on the overall performance of a PV-T system, located in Shiraz, Iran. It is found that employing twisted tape improves the energy and exergy efficiency by approx. 6.3%. The best configuration yields 12.4% and 16.8% increase in energy and exergy efficiency compared to conventional PV systems. This is achieved at 15% volumetric concentration of microencapsulated phase change material slurry. The monthly variation of global horizontal irradiance in Shiraz highly affected the energy and exergy efficiency of PV-T, with July and October exhibiting the most efficient months, corresponding to 90% and 11.3%, respectively.
In this study, the performance of the adaptive optics (AO) system was analyzed through a numerical computer simulation implemented in MATLAB. Making a phase screen involved turning computer-generated random numbers into two-dimensional arrays of phase values on a sample point grid with matching statistics. Von Karman turbulence was created depending on the power spectral density. Several simulated point spread functions (PSFs) and modulation transfer functions (MTFs) for different values of the Fried coherent diameter (ro) were used to show how rough the atmosphere was. To evaluate the effectiveness of the optical system (telescope), the Strehl ratio (S) was computed. The compensation procedure for an AO syst
... Show MoreThis paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ
... Show MoreAfter the outbreak of COVID-19, immediately it converted from epidemic to pandemic. Radiologic images of CT and X-ray have been widely used to detect COVID-19 disease through observing infrahilar opacity in the lungs. Deep learning has gained popularity in diagnosing many health diseases including COVID-19 and its rapid spreading necessitates the adoption of deep learning in identifying COVID-19 cases. In this study, a deep learning model, based on some principles has been proposed for automatic detection of COVID-19 from X-ray images. The SimpNet architecture has been adopted in our study and trained with X-ray images. The model was evaluated on both binary (COVID-19 and No-findings) classification and multi-class (COVID-19, No-findings
... Show MoreRequire senior management of the state when developing the strategy the general budget to the clarity of the reasons that are based upon the ministries in the preparation of estimates of expenditure for the next year to justify the spending, and in the absence of targets, the ministry or government unit would not be in front, but be guided by the size of expenditure for the last year in addition to the percentage of represented an increase of appropriations required for the next year in light of the fiscal policy of the state, so the requested increase in appropriations to meet the desired increase in some of its activities and to meet the increase in salaries and prices. So must be available to the Ministry of criteria that coul
... Show MoreGlobal virtual teams (GVTs) are a recent organizational adaptation created to meet the needs of globalizatized marketplace. GVTs are essentially teams that are distributed across national boundaries and concerned through advanced information and communication technology (ICT) such as email, instant messaging, and video conferencing. The research on GVTs is important in the information system (IS) field because GVTs are dependent on information communication technology and the use of other technologies; GVTs also consists of people from different cultures. This paper tried to answer two research questions. The first one is: what are the GVTs problems facing the project manager (PM). A literature review was conducted to answer the fir
... Show MoreRationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.
The organization and coordination of any communication is based on the system of turn-taking which refers to the process by which a participant in a conversation takes the role of speaker. The progression of any conversation is achieved by the change of roles between speaker and hearer which, in its turn, represents the heart of the turn-taking system. The turn-taking system is not a random process but it is a highly organized process governed by a set of rules. Thus, this system has certain features and rules which exist in any English communicative process. These rules, if applied by speakers, help to achieve successful exchange of turns in any conversation. This paper attempts to present full exposition of the concepts of conversation
... Show MoreResearchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa
... Show More