The thermal and electrical performance of different designs of air based hybrid photovoltaic/thermal collectors is investigated experimentally and theoretically. The circulating air is used to cool PV panels and to collect the absorbed energy to improve their performance. Four different collectors have been designed, manufactured and instrumented namely; double PV panels without cooling (model I), single duct double pass collector (model II), double duct single pass (model III), and single duct single pass (model IV) . Each collector consists of: channel duct, glass cover, axial fan to circulate air and two PV panel in parallel connection. The temperature of the upper and lower surfaces of PV panels, air temper
... Show MoreThe paper tackles two topics. The first is about the term "Ремейк" which is very common in contemporary Russian literature; it has counterparts such as " Обработка" and " Переделка", where these two may indicate any of the following meanings (remake, reformulate, rewrite, treatment, modification, change). It has been shown that this term does not have a stable definition. Also, the role of this term in literary studies has been mentioned along with how it has come to its peak of use in post-modern literature.
The second is that I have taken a sample of well-known works in Russian literature " On the Eve, On the Eve " by the contemporary Russian writer YevgueniBobov, and shown the effort of the writer
... Show MoreThe prostaglandins inside inflamed tissues are produced by cyclooxygenase-2 (COX-2), making it an important target for improving anti-inflammatory medications over a long period. Adverse effects have been related to the traditional usage of non-steroidal anti-inflammatory drugs (NSAIDs) for the treatment of inflammation, mainly centered around gastrointestinal (GI) complications. The current research involves the creation of a virtual library of innovative molecules showing similar drug properties via a structure-based drug design. A library that includes five novel derivatives of Diclofenac was designed. Subsequently, molecular docking through the Glide module and determining the binding free energy implementing the P
... Show MoreBackground This study aimed to evaluate the efficacy of once-daily liraglutide as an add-on to oral antidiabetics (OADs) on glycemic control and body weight in obese patients with inadequately controlled type 2 diabetes (T2D). Methods A total of 27 obese T2D patients who received 7 months (0.6 mg/day for the first month, 1.2 mg/day for 3 months, and 1.8 mg/day for 3 months) of liraglutide treatment as an add-on to OADs were included. Data on body weight (kg), fasting plasma glucose (FPG, mg/dL), postprandial glucose (PPG, mg/dL), and HbA1c (%), were recorded. Results Liraglutide doses of 1.2 mg/day and 1.8 mg/day were associated with significant decreases in body weight (by 8.0% and 11.9%, respectively, p < 0.01 for each) and HbA1c (by 20.0
... Show MoreThe syntheses, characterizations and structures of three novel dichloro(bis{2-[1-(4-methoxyphenyl)-1H-1,2,3-triazol-4-yl-κN3]pyridine-κN})metal(II), [M(L)2Cl2], complexes (metal = Mn, Co and Ni) are presented. In the solid state the molecules are arranged in infinite hydrogen-bonded 3D supramolecular structures, further stabilized by weak intermolecular π…π interactions. The DFT results for all the different spin states and isomers of dichloro(bis{2-[1-phenyl-1H-1,2,3-triazol-4-yl-κN3]pyridine-κN})metal(II) complexes, [M(L1)2Cl2], support experimental measurements, namely that (i) d5 [Mn(L1)2Cl2] is high spin with S = 5/2; (ii) d7 [Co(L1)2Cl2] has a spin state of S = 3/2, (iii) d8 [Ni(L1)2Cl2] has a spin state of S =
... Show MoreThis research sheds light on the morphological structure of nouns and verbs in the novel "ASTONISHMENT" by the novelist Aharon Applefield by analysing selected models from the novel in a morphological analysis in order to identify the most important morphological features of this structure according to a statistical analytical approach.
The morphological structure is the main pillar of the linguistic structure of the literary text. Morphology is the science that studies the word, by which its structure and original letters are known, and the change that has occurred to it. The aesthetics of the fictional text is reflected in this structure, through which the writer conveys his ideas and narrations to the reader. The research
... Show MoreNovel bidentate Schiff bases having nitrogen-sulphur donor sequence was synthesized from condensation of racemate camphor, (R)-camphor and (S)-camphor with Methyl hydrazinecarbodithioate (SMDTC). Its metal complexes were also prepared through the reaction of these ligands with silver and bismuth salts. All complexes were characterized by elemental analyses and various physico-chemical techniques. These Schiff bases behaved as uninegatively charged bidentate ligands and coordinated to the metal ions via ?-nitrogen and thiolate sulphur atoms. The NS Schiff bases formed complexes of general formula, [M(NS)2] or [M(NS)2.H2O] where M is BiIII or AgI, the expected geometry is octahedral for Bi(III) complexes while Ag(I) is expected to oxidized t
... Show MoreBuckling analysis of a laminated composite thin plate with different boundary conditions subjected to in-plane uniform load are studied depending on classical laminated plate theory; analytically using (Rayleigh-Ritz method). Equation of motion of the plates was derived using the principle of virtual work and solved using modified Fourier displacement function that satisfies general edge conditions. The eigenvalue problem generated by using Ritz method, the set of linear algebraic equations can be solved using MATLAB for symmetric and anti-symmetric, cross and angle-ply laminated plate considering some design parameters such as aspect ratios, number of layers, lamination type and orthotropic ratio. The results obtained g
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More