Lead-acid batteries have been used increasingly in recent years in solar power systems, especially in homes and small businesses, due to their cheapness and advanced development in manufacturing them. However, these batteries have low voltages and low capacities, to increase voltage and capacities, they need to be connected in series and parallel. Whether they are connected in series or parallel, their voltages and capacities must be equal otherwise the quality of service will be degraded. The fact that these different voltages are inherent in their manufacturing, but these unbalanced voltages can be controlled. Using a switched capacitor is a method that was used in many methods for balancing voltages, but their responses are slow. To increase the response and control of the balancing process, this research proposes a novel technique that consists of a dynamic capacitor for controlling the unbalanced voltages of series-connected lead-acid batteries. The proposed technique uses a main capacitor and an inductor with two switches their on/off states are controlled through a pulse width modulation. The technique is designed and validated using MATLAB/Simulink and the results for different cases are compared with other techniques such as switched capacitor technique. Results show that the proposed method promised the balancing control in a shorter time and better performance than other techniques which are crucial in the battery’s voltage balancing.
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Transdermal drug delivery has made an important contribution to medical practice but has yet to fully achieve its potential as an alternative to oral delivery and hypodermic injections. Transdermal therapeutic systems have been designed to provide controlled continuous delivery of drugs through the skin to the systemic circulation. A transdermal patch is an adhesive patch that has a coating of drug; the patch is placed on the skin to deliver particular amount of drug into the systemic circulation over a period of time. The transdermal drug delivery systems (TDDS) review articles provide information regarding the transdermal drug delivery systems and its evaluation process as a ready reference for the research scientist who is involved
... Show MoreWith the development of computer architecture and its technologies in recent years, applications like e-commerce, e-government, e-governance and e-finance are widely used, and they act as active research areas. In addition, in order to increase the quality and quantity of the ordinary everyday transactions, it is desired to migrate from the paper-based environment to a digital-based computerized environment. Such migration increases efficiency, saves time, eliminates paperwork, increases safety and reduces the cost in an organization. Digital signatures are playing an essential role in many electronic and automatic based systems and facilitate this migration. The digital signatures are used to provide many services and s
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More<span lang="EN-US">The need for robotics systems has become an urgent necessity in various fields, especially in video surveillance and live broadcasting systems. The main goal of this work is to design and implement a rover robotic monitoring system based on raspberry pi 4 model B to control this overall system and display a live video by using a webcam (USB camera) as well as using you only look once algorithm-version five (YOLOv5) to detect, recognize and display objects in real-time. This deep learning algorithm is highly accurate and fast and is implemented by Python, OpenCV, PyTorch codes and the Context Object Detection Task (COCO) 2020 dataset. This robot can move in all directions and in different places especially in
... Show MoreBackground : Xanthomatosis is a disease in which large tendon tumors can occur, especially in the Achilles tendon. This disease is a rare interesting orthopaedic condition. Case Report:A case of a twenty eight year old girl patient with giant bilateral Achilles tendon xanthomas in which both tumors were resected. There was no ulceration on the both sides. The patient was treated by total resection of the lesion and reconstruction using tendon transfer of the Peroneus brevis and Flexor hallusis longus. Postoperative treatment consisted of six weeks lower leg cast immobilization followed by partial weight bearing. After 4 months the patient was able to walk pain free without any difficulties. It has been suggested that total resection with au
... Show MoreBackground : Xanthomatosis is a disease in which large tendon tumors can occur, especially in the Achilles tendon. This disease is a rare interesting orthopaedic condition.
Case Report:A case of a twenty eight year old girl patient with giant bilateral Achilles tendon xanthomas in which both tumors were resected.
There was no ulceration on the both sides. The patient was treated by total resection of the lesion and reconstruction using tendon transfer of the Peroneus brevis and Flexor hallusis longus. Postoperative treatment consisted of six weeks lower leg cast immobilization followed by partial weight bearing. After 4 months the patient was able to walk pain free without any difficultie
... Show MoreBackground: Giant middle cerebral artery (MCA) aneurysms are surgically challenging lesions. Because of the complexity and variability of these aneurysms, a customized surgical technique is often needed for each case. In this article, we present a modified clip reconstruction technique of a ruptured complex giant partially thrombosed middle cerebral artery aneurysm.
Case description: The aneurysm was exposed using the pterional approach. Following proximal control, the aneurysm sac was decompressed. Then, we applied permanent clips to reconstruct the aneurysm neck. The configuration of the aneurysm mandated a tailored clipping pattern to account for resi
... Show More