To create a highly efficient photovoltaic-thermal (PV-T) system and maximise the energy and exergy efficiency, this study aims to propose an innovative configuration of a PV-T system comprising wavy tubes with twisted-tape inserts. Following the validation of a numerical model, a parametric study has been conducted to assess the geometrical effects of twisted tape and wavy tubes, as well as the coolant fluid type and velocity, on the overall performance of a PV-T system, located in Shiraz, Iran. It is found that employing twisted tape improves the energy and exergy efficiency by approx. 6.3%. The best configuration yields 12.4% and 16.8% increase in energy and exergy efficiency compared to conventional PV systems. This is achieved at 15% volumetric concentration of microencapsulated phase change material slurry. The monthly variation of global horizontal irradiance in Shiraz highly affected the energy and exergy efficiency of PV-T, with July and October exhibiting the most efficient months, corresponding to 90% and 11.3%, respectively.
This paper presents a nonlinear finite element modeling and analysis of steel fiber reinforced concrete (SFRC) deep beams with and without openings in web subjected to two- point loading. In this study, the beams were modeled using ANSYS nonlinear finite element
software. The percentage of steel fiber was varied from 0 to 1.0%.The influence of fiber content in the concrete deep beams has been studied by measuring the deflection of the deep beams at mid- span and marking the cracking patterns, compute the failure loads for each deep beam, and also study the shearing and first principal stresses for the deep beams with and without openings and with different steel fiber ratios. The above study indicates that the location of openings an
Background: The study of human leukocytes (HLA) alleles, and haplotype frequencies within populations provide an important source of information for anthropological investigation, organ and hematopoietic stem cell transplantation as well as disease association, certain diseases showed association with specific alleles specially those of known or suspected hereditary origin or immunological basis, whether simple renal cyst is congenital or acquired is still unclear and need to be investigated.Objectives: To study the genetic aspect of simple renal cysts by detecting the gene frequency and the haplotype of HLA class I of patients with simple renal cysts, and to find the presence of these cysts in other family members.Method: Thirty patient
... Show MoreTransdermal drug delivery has made an important contribution to medical practice but has yet to fully achieve its potential as an alternative to oral delivery and hypodermic injections. Transdermal therapeutic systems have been designed to provide controlled continuous delivery of drugs through the skin to the systemic circulation. A transdermal patch is an adhesive patch that has a coating of drug; the patch is placed on the skin to deliver particular amount of drug into the systemic circulation over a period of time. The transdermal drug delivery systems (TDDS) review articles provide information regarding the transdermal drug delivery systems and its evaluation process as a ready reference for the research scientist who is involved
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various
... Show MoreAbstract
The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin
... Show MoreThe corrosion behavior of carbon steel at different Temperatures and in water containing different sodium chloride
concentrations under 3 bar pressure has been investigated using weight loss method . The carbon steel specimens were
immersed in water containing (100,400,700,1000PPM) of NaCl solution and under temperature was increased from
(90-120ºC) under pressures of 3 bar. The results of this investigation indicated that corrosion rate increased with NaCl
concentrations and Temperature.
The performance quality and searching speed of Block Matching (BM) algorithm are affected by shapes and sizes of the search patterns used in the algorithm. In this paper, Kite Cross Hexagonal Search (KCHS) is proposed. This algorithm uses different search patterns (kite, cross, and hexagonal) to search for the best Motion Vector (MV). In first step, KCHS uses cross search pattern. In second step, it uses one of kite search patterns (up, down, left, or right depending on the first step). In subsequent steps, it uses large/small Hexagonal Search (HS) patterns. This new algorithm is compared with several known fast block matching algorithms. Comparisons are based on search points and Peak Signal to Noise Ratio (PSNR). According to resul
... Show More