In this research, main types of optical coatings are presented which are used as covers for solar cells, these coatings are reflect the infrared (heat) from the solar cell to increase the efficiency of the cell (because the cell’s efficiency is inversely proportional to the heat), then the theoretical and mathematical description of these optical coatings are presented, and an optical design is designed to meet this objective, its optical transmittance was calculated using (MATLAB R2008a) and (Open Filters 1.0.2) programs
Background. Body mass index (BMI) is a person's weight in kilograms (or pounds) divided by the square of height in meters (or feet). Obesity affects a wide spectrum of age groups, from the young to the elderly, and there are several eye diseases related to obesity like diabetic retinopathy, floppy eyelid syndrome, retinal vein occlusion, stroke-related vision loss, age-related macular degeneration, and possibly, refractive errors. Refractive errors (RE) are optical imperfections related to the focusing ability of the eye and are the main cause of visual impairment which may result in missed education and employment opportunities, lower productivity and impaired quality of life. Aim. The study aimed to find an association between bod
... Show MoreThere is no access to basic sanitation for half the world's population, leading to Socioeconomic issues, such as scarcity of drinking water and the spread of diseases. In this way, it is of vital importance to develop water management technologies relevant to the target population. In addition, in the separation form of water treatment, the compound often used as a coagulant in water treatment is aluminum sulfate, which provides good results for raw water turbidity and color removal. Studies show, however, that its deposition in the human body, even Alzheimer's disease, can cause serious harm to health and disease development. The study aims to improve the coagulation/flocculation stage related to the amount of flakes, i
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreAn excellent reputation earned by initiating and practicing sustainable business practices has additional benefits, of which are reducing environmental incidents and an improvement in operational efficiency as this has the potential to help firms improve on productivity and bring down operating costs. Taken further, with ever-increasing socially and environmentally-conscious investors and the public alike, this act of natural resources management could have a significant implication on market value and income of the practicing firms.
The above proposition has been supported by sustainable business practices literature that is continuously conversing and deliberating upon the impact of efficient resource d
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication
... Show MoreThe growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi
... Show More