Photovoltaic (PV) devices are widely used renewable energy resources and have been increasingly manufactured by many firms and trademarks. This condition makes the selection of right product difficult and requires the development of a fast, accurate and easy setup that can be implemented to test available samples and select the cost effective, efficient, and reliable product for implementation. An automated test setup for PV panels using LabVIEW and several microcontroller-based embedded systems were designed, tested, and implemented. This PV testing system was fully automated, where the only human intervention required was the instalment of PV panel and set up of required testing conditions. The designed and implemented system was characterized by high performance standard with accuracy, precision, and resolution that is good enough to practically test any PV panel of the 12 V and 24 V ratings. In this paper, several simulations run and manually performed testing for PV panels were done to verify the automatically obtained results and those were found to be of good conformity (-3% difference with simulation results, 0.01% with manually taken results).
The aim of this study was to investigate the effectiveness of binary solvent for regeneration of spent lubricating oil by extraction-flocculation process. The regeneration was investigated by bench scale experiments by using locally provided solvents (Heavy Naphtha, n-Butanol, and iso-Butanol). Solvents to used oil, mixing time, mixing speed and temperatures were studied as operating parameters. The performance on three estimated depended key parameters, namely the percentage of base oil recovered (Yield), percent of oil loss (POL), and the percent of sludge removal (PSR) were used to evaluate the efficiency of the employed binary solvent on extraction process. The best solvent to solvent ratio for binary system were 30:70 for Heavy Naph
... Show MoreNetwork security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed
This study aims to show the effectiveness of immobilization of Chlorella green algae biomass in the form of bead for the removal of lead ions from synthetic polluted water at various operational parameters such as pH (2–6), biosorbent dosage (0.5–20 g/L) and initial concentration (10–100 mg/L). More than 90 % removal efficiency was achieved. FTIR and SEM-EDX analysis of the biosorbent before and after sorption show differences in the functional groups on the adsorbent surface. Langmuir and Freundlich equilibrium isotherm, pseudo-first-order and pseudo-second-order kinetic models were applied to the experimental and results and show good conformity with Langmuir isotherm model and pseudo-second-order kinetic model with c
... Show MoreThis paper proposes a novel finite-time generalized proportional integral observer (FTGPIO) based a sliding mode control (SMC) scheme for the tracking control problem of high order uncertain systems subject to fast time-varying disturbances. For this purpose, the construction of the controller consists of two consecutive steps. First, the novel FTGPIO is designed to observe unmeasurable plant dynamics states and disturbance with its higher time derivatives in finite time rather than infinite time as in the standard GPIO. In the FTGPO estimator, the finite time convergence rate of estimations is well achieved, whereas the convergence rate of estimations by classical GPIO is asymptotic and slow. Secondly, on the basis of the finite and fast e
... Show MoreAbstract A descriptive study was carried out on nurses who were working at burn. Units in Baghdad city hospitals, Al-Kindy , Al-Yarmook, Al-Qadisiya, Al-karkh, and Al-Karama hospital, in the period from 20th july 2003 to 20th November 2003. The study aimed to identify the nurses performance about pain management for burned patients at burn units and find out the relationship between the demographic characteristics and performance . A purposive (non-probability) sample of (40) nurses, (24) male nurses and (16) female. The data were collected through the use of observational checklist, which comprised (
The growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication
... Show MoreA novel demountable shear connector is proposed to link a concrete slab to steel sections in a way that resulting steel-concrete composite floor is demountable, i.e. it can be easily dismantled at the end of its service life. The proposed connectors consist of two parts: the first part is a hollow steel tube with internal threads at its lower end. The second part is a compatible partially threaded bolted stud. After linking the stud to the steel section, the hollow steel tube can be fastened over the threaded stud, which create a complete demountable shear connector. The connector is suitable for use in both composite bridges and buildings, and using cast in-situ slabs, precast solid slabs, or hollow-core precast slabs. A series of push-off
... Show More