Solar energy is one of the immeasurable renewable energy in power generation for a green, clean and healthier environment. The silicon-layer solar panels absorb sun energy and converts it into electricity by off-grid inverter. Electricity is transferred either from this inverter or from transformer, consumed by consumption unit(s) available for residential or economic purposes. The artificial neural network is the foundation of artificial intelligence and solves many complex problems which are difficult by statistical methods or by humans. In view of this, the purpose of this work is to assess the performance of the Solar - Transformer - Consumption (STC) system. The system may be in complete breakdown situation due to failure of both solar power automation subsystem and transformer simultaneously or consumption unit; otherwise it works with fully or lesser efficiency. Statistically independent failures and repairs are considered. Using the elementary probabilities phenomenon incorporated with differential equations is employed to examine the system reliability, for repairable and non-repairable system, and to analyze its cost function. The accuracy and consistency of the system can be improved by feed forward- back propagation neural network (FFBPNN) approach. Its gradient descent learning mechanism can update the neural weights and hence the results up to the desired accuracy in each iteration, and aside the problem of vanishing gradient in other neural networks, that increasing the efficiency of the system in real time. MATLAB code for FFBP algorithm is built to improve the values of reliability and cost function by minimizing the error up to 0.0001 precision. Numerical illustrations are considered with their data tables and graphs, to demonstrate and analyze the results in the form of reliability and cost function, which may be helpful for system analyzers.
The current research aims to know the extent of the impact of performance evaluation in its dimensions as an explanatory variable in the behavioural and attitudinal work outputs with its dimensions as a response variable in order to reach appropriate solutions through which the University of Fallujah seeks to achieve its goal in the process of diagnosing the axes of strength and to benefit from them in the process of strengthening the status and sobriety of the academic position of the professor and the researcher relied on The descriptive and analytical approach in carrying out this study, and data was collected from university professors, including leaders, heads of departments and divisions, who numbered (97) teachers. And fie
... Show More
In this work, a novel technique to obtain an accurate solutions to nonlinear form by multi-step combination with Laplace-variational approach (MSLVIM) is introduced. Compared with the traditional approach for variational it overcome all difficulties and enable to provide us more an accurate solutions with extended of the convergence region as well as covering to larger intervals which providing us a continuous representation of approximate analytic solution and it give more better information of the solution over the whole time interval. This technique is more easier for obtaining the general Lagrange multiplier with reduces the time and calculations. It converges rapidly to exact formula with simply computable terms wit
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreThe importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process
... Show MoreIn this paper, an enhanced artificial potential field (EAPF) planner is introduced. This planner is proposed to rapidly find online solutions for the mobile robot path planning problems, when the underlying environment contains obstacles with unknown locations and sizes. The classical artificial potential field represents both the repulsive force due to the detected obstacle and the attractive force due to the target. These forces can be considered as the primary directional indicator for the mobile robot. However, the classical artificial potential field has many drawbacks. So, we suggest two secondary forces which are called the midpoint
... Show MoreThis research aims to identify the level of extension administration performance under comprehensive quality standards from the perspective of the working staff in agricultural extension at the level of the general extension body and agricultural directorates and agricultural division.this was to identify the extension administration performance under comprehensive quality standards from the perspective of vegetables growers , random sample was selected from the central region governorates Baghdad , Diyala , Babel , karbala and Al-Najaf , a random sample from the workers in the general body numbered 56 employee , sample of staff working in agricultural extension was selected at the level of agricultural directorates in proportion
... Show MoreThis research Sheds highlights the procedural protections that must be enjoyed by the consumer in the face of the product, which is the protection of no less dangerous than the substantive protection of our obligations and duties delivered by the legislature upon the product of consumer interest, what is the benefit of the right if the access road to him complicated, so know The consumer has a right to the face of the product, but leaves the claim, either to ignorance For access to this right either to the difficulty of connecting to him.
That this research modest attempt we tried through which to focus on the way to the consumer behavior of arrived right, as we tried to highlight the weaknesses and the complexity of the procedure to
The shortage in surface water quantities led to a shift in dependence on the groundwater as an alternative water source in southern parts of Iraq. The groundwater is decreasing in quantity and water quality is degrading due to different factors. Therefore, it is important to assess the groundwater quality of the Missan Governorate of the country by analyzing the physicochemical parameters and distinguishing the probable sources of contaminants in the area. The present study used water quality diagrams and statistical methods such as factor analysis and agglomerative cluster analysis to determine the sources of chemical ions in the forty-four groundwater samples collected from wells in the study area. In addition, the Water Quality Index (WQ
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show More