In this work laser detection and tracking system (LDTS) is designed and implemented using a fuzzy logic controller (FLC). A 5 mW He-Ne laser system and an array of nine PN photodiodes are used in the detection system. The FLC is simulated using MATLAB package and the result is stored in a lock up table to use it in the real time operation of the system. The results give a good system response in the target detection and tracking in the real time operation.
This researchpaper includes the incorporation of Alliin at various energy levels and angles
With Metformin using Gaussian 09 and Gaussian view 06. Two computers were used in this work. Samples were generated to draw, integrate, simulate and measure the value of the potential energy surface by means of which the lowest energy value was (-1227.408au). The best correlation compound was achieved between Alliin and Metformin through the low energy values where the best place for metformin to b
... Show MoreThe paper delves into the semantic field to establish sense as an important category within the domain of conceptual or cognitive meaning. Varioussense-relationships that hold between lexical items are linguistically explored. Thesystem of these relationships, asthe paper shows, categoricallyreveals itself in terms of synonymy, antonymy,homonomy, hyponymy, polysemy and colour terms,inthis paper.Despite some overlapping, eachof these items announces its distinctive feature. Thepaper ends with a conclusion that reveals the merits ofalinguistic treatment of these refined semantic aspects.
Background: Pyogenic granuloma is a hyperplastic benign tumor. The most common intra-oral site is marginal gingiva. It is often occurred in the second decade of life, it has a strong tendency to recur after simple excision.
The aim of study: to evaluate the therapeutic advantages of diode laser (810-980 nm) in intraoral Pyogenic granuloma management.
Materials and method: A total of 28 patients (14 men and 14 females) were enrolled in this study and had their pyogenic granuloma surgically removed using a diode laser. All of the patients were given local anesthetic and went through the identical surgical procedure (cartridge containing 1 percent lidocaine with epinephrine 1:
... Show MoreThis paper demonstrates the construction designing analysis and control strategies for fully tracking concentrated solar thermal by using programmable logic control in the city of Erbil-Iraq. This work used the parabolic dish as a concentrated solar thermal. At the focal point, the collected form of energy is used for heating a (water) in the receiver, analyzing this prototype in real-time with two different shapes of the receiver and comparing the results. For tracking the parabolic dish, four light-dependent resistors are used to detect the sun's position in the sky so that the tracking system follows it to make the beam radiation perpendicular to the collector surface all of the time during the day for maximum solar p
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreEnhancement of the performance for hybrid solar air conditioning system was presented in this paper. The refrigerant temperature leaving the condenser was controlled using three-way valve, this valve was installed after the compressor to regulate refrigerant flow rate towards the solar system. A control system using data logger, sensors and computer was proposed to set the opening valve ratio. The function of control program using LabVIEW software is to obtain a minimum refrigerant temperature from the condenser outlet to enhance the overall COP of the unit by increasing the degree of subcooled refrigerant. A variable load electrical heater with coiled pipe was used instead of the solar collector and the storage tank to simulate the sola
... Show MoreWe propose a new object tracking model for two degrees of freedom mechanism. Our model uses a reverse projection from a camera plane to a world plane. Here, the model takes advantage of optic flow technique by re-projecting the flow vectors from the image space into world space. A pan-tilt (PT) mounting system is used to verify the performance of our model and maintain the tracked object within a region of interest (ROI). This system contains two servo motors to enable a webcam rotating along PT axes. The PT rotation angles are estimated based on a rigid transformation of the the optic flow vectors in which an idealized translation matrix followed by two rotational matrices around PT axes are used. Our model was tested and evaluated
... Show More