Lead-acid batteries have been used increasingly in recent years in solar power systems, especially in homes and small businesses, due to their cheapness and advanced development in manufacturing them. However, these batteries have low voltages and low capacities, to increase voltage and capacities, they need to be connected in series and parallel. Whether they are connected in series or parallel, their voltages and capacities must be equal otherwise the quality of service will be degraded. The fact that these different voltages are inherent in their manufacturing, but these unbalanced voltages can be controlled. Using a switched capacitor is a method that was used in many methods for balancing voltages, but their responses are slow. To increase the response and control of the balancing process, this research proposes a novel technique that consists of a dynamic capacitor for controlling the unbalanced voltages of series-connected lead-acid batteries. The proposed technique uses a main capacitor and an inductor with two switches their on/off states are controlled through a pulse width modulation. The technique is designed and validated using MATLAB/Simulink and the results for different cases are compared with other techniques such as switched capacitor technique. Results show that the proposed method promised the balancing control in a shorter time and better performance than other techniques which are crucial in the battery’s voltage balancing.
A characteristic study of a passively Q-switched diode pumped solid state laser system is presented in this work. For laser a comparison study for the theoretically calculated results with a simulation results using a software which calculates the Q-switched solid state laser parameters was such as energy, peak power and pulse width were performed. There was a good agreement between our theoretical calculations and the simulation values.
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Transdermal drug delivery has made an important contribution to medical practice but has yet to fully achieve its potential as an alternative to oral delivery and hypodermic injections. Transdermal therapeutic systems have been designed to provide controlled continuous delivery of drugs through the skin to the systemic circulation. A transdermal patch is an adhesive patch that has a coating of drug; the patch is placed on the skin to deliver particular amount of drug into the systemic circulation over a period of time. The transdermal drug delivery systems (TDDS) review articles provide information regarding the transdermal drug delivery systems and its evaluation process as a ready reference for the research scientist who is involved
... Show MoreLowering the emission, fuel economy and torque management are the essential
requirements in the recent development in the automobile industry. The main engine control
input that satisfies the above requirements is the throttling angle which adjusts the air mass
flow rate to the engine port. Due to the uncertainty and the presence of the nonlinear
components in its dynamical model, the sliding mode control theory is utilized in this work
for the throttle valve angle control system to design a robust controller for this system in the
presence of a nonlinear spring and Coulomb friction. A continuous sliding mode control law
which consists of a saturation function, instead of a signum function, and the integral of
ano
Abstract
The environmental conditions are important factors, because they affect both the efficiency of a photovoltaic module and the energy load. This research was carried out experimentally and modeling was done in MATLAB –Simulink by monitoring the variation in power output of the system with environmental conditions such as solar radiation, ambient temperature, wind speed, and humidity of Baghdad city. From the results, the ambient temperatures are inversely proportional to humidity and the output power performance of the system, while the wind speed is directly proportional with the output power performance of the system.
Keywords:
... Show MoreAlthough renewable energy systems have become an interesting global issue, it is not continuous either daily or seasonally. Latent heat energy storage (LHES) is one of the suitable solutions for this problem. LHES becomes a basic element in renewable energy systems. LHES compensate for the energy lack when these systems are at low production conditions. The present work considered a shell and tube LHES for numerical investigation of the tube rotation influence on the melting process. The simulation and calculations were carried out using ANSYS Fluent software. Paraffin wax represents the phase change material (PCM) in this work, while water was selected to be the heat transfer fluid (HTF). The calculations were carried o
... Show MoreIn this paper, a FPGA model of intelligent traffic light system with power saving was built. The intelligent traffic light system consists of sensors placed on the side's ends of the intersection to sense the presence or absence of vehicles. This system reduces the waiting time when the traffic light is red, through the transition from traffic light state to the other state, when the first state spends a lot of time, because there are no more vehicles. The proposed system is built using VHDL, simulated using Xilinx ISE 9.2i package, and implemented using Spartan-3A XC3S700A FPGA kit. Implementation and Simulation behavioral model results show that the proposed intelligent traffic light system model satisfies the specified operational req
... Show MoreThis study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially th
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThis study carry’s out the correlation and the effect of two main variables, these variables are Job Satisfaction included six sub: wages - salaries and justice and yield, working conditions and services, pattern of supervision and the relationship with the manger, Relationship with colleagues, the content of the work and the variety of tasks, development and promotion opportunities available to an individual, and Organizational Performance included two sub variables: Efficiency, Effectiveness. This research was conducted using a questioner as a main tool, This questioner was distributed randomly to a research community composed of
... Show More