Solar energy is one of the immeasurable renewable energy in power generation for a green, clean and healthier environment. The silicon-layer solar panels absorb sun energy and converts it into electricity by off-grid inverter. Electricity is transferred either from this inverter or from transformer, consumed by consumption unit(s) available for residential or economic purposes. The artificial neural network is the foundation of artificial intelligence and solves many complex problems which are difficult by statistical methods or by humans. In view of this, the purpose of this work is to assess the performance of the Solar - Transformer - Consumption (STC) system. The system may be in complete breakdown situation due to failure of both solar power automation subsystem and transformer simultaneously or consumption unit; otherwise it works with fully or lesser efficiency. Statistically independent failures and repairs are considered. Using the elementary probabilities phenomenon incorporated with differential equations is employed to examine the system reliability, for repairable and non-repairable system, and to analyze its cost function. The accuracy and consistency of the system can be improved by feed forward- back propagation neural network (FFBPNN) approach. Its gradient descent learning mechanism can update the neural weights and hence the results up to the desired accuracy in each iteration, and aside the problem of vanishing gradient in other neural networks, that increasing the efficiency of the system in real time. MATLAB code for FFBP algorithm is built to improve the values of reliability and cost function by minimizing the error up to 0.0001 precision. Numerical illustrations are considered with their data tables and graphs, to demonstrate and analyze the results in the form of reliability and cost function, which may be helpful for system analyzers.
Ultraviolet light radiation is applied to treat Plaque Psoriasis disease by targeted phototherapy. This is available through Narrowband-UVB light radiation devices peaked at wavelength 311 nm. Ten cases were chosen as a study group, 8 males aged 22-40 years old, and 2 females aged 25 and 32 years old who were exposed to ultraviolet light radiation. Their recovery or improvement was followed weekly. Different doses were used according to the severity of the lesion and as a trial for the outcome. The dose was given two times a week, starting with 200mJ/cm2, and subsequently increased by 100 or 200 mJ/cm2 reaching a maximum dose as tolerated by each individual patient. Improvement was observed after 4 – 6 weeks. The
... Show MoreIn this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10
... Show MoreAbstract:
The current research included " Diagnosis of the reality of the gap for the requirements of Business Continuity Management System According to International Standard (ISO 22301: 2012) in Midland Refineries Company (Daura Refinery) " , for development of an administrative system for Business Continuity is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others . the international legitimacy (represented by the international organization for standardization (ISO)) remains the basis for matching and commitment , and the importance of the application of Business Continuity Management Syst
... Show MoreTested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin
This paper presents a fuzzy logic controller for a two-tank level control system, which is a process with a dead time. The fuzzy controller is a proportional-integral (PI-like) fuzzy controller which is suitable for steady state behavior of the system. Transient behavior of the system was improved without the need for a derivative action by suitable change in the rule base of the controller. Simulation results showed the step response of the two-tank level control system when this controller was used to control this plant and the effect of the dead time on the response of the system.
This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreThe success of any institution must be based on means to protect its resources and assets from the waste, loss, misuse and the availability of accurate and reliable data by accounting reports to increase its operational efficiency, namely, that the internal control system is considered as a safety valve for top management in any economic unit. The problem is represented by the need for an efficient system, so to ensure its success, there must exist external parties which monitor and evaluate the performance because of its importance by following clear criteria. So, the research problem came to address performance evaluation indicators which are set by the Federal Board of Supreme Audit (FBSA) and identify the extent of its contribution t
... Show More