Optimizing the Complex Systems Reliability Using Mixed Strategy in Ultra-fast Gas Turbine Protection System
...Show More Authors
A system was used to detect injuries in plant leaves by combining machine learning and the principles of image processing. A small agricultural robot was implemented for fine spraying by identifying infected leaves using image processing technology with four different forward speeds (35, 46, 63 and 80 cm/s). The results revealed that increasing the speed of the agricultural robot led to a decrease in the mount of supplements spraying and a detection percentage of infected plants. They also revealed a decrease in the percentage of supplements spraying by 46.89, 52.94, 63.07 and 76% with different forward speeds compared to the traditional method.
There is an association between the signifier and the signifier. This association shows the eyeball, which acquires a direct presence and whose presence influences the level of production of the hidden connotation. Because the theatrical presentation is a series of auditory-visual functions, these signs are looking for the exploration of their meanings and their evocation to form a complete loop to achieve the association of the above. This is what made the researcher to monitor the abundance of semantic shifts in theatrical presentation as long as the implications of the strategy continue in the game of semantic production with multiple horizons, and the idea in theatrical presentation tolerates multiple readings according to the refere
... Show MoreTemporomandibular Disorders (TMD) refer to a group of symptoms where pain is the most leading cause to demand a treatment by the patient. Light therapies are of great importance at current times due to its biosafety and non-invasive quality when used for the management of TMD symptoms. This study aimed to evaluate the efficacy of red LED light with low-level LASER in treating TMD patients.
A double-blind randomized clinical study was conducted and included 60 patients along 3 groups (20 for e
Amorphization of drug has been considered as an attractive approach in improving drug solubility and bioavailability. Unlike their crystalline counterparts, amorphous materials lack the long-range order of molecular packing and present the highest energy state of a solid material. Co-amorphous systems (CAM) are an innovative formulation technique by where the amorphous drugs are stabilized via powerful intermolecular interactions by means of a low molecular co-former.
This review highlights the different approaches in the preparation of co-amorphous drug delivery system, the proper selection of the co-formers. In addition, the recent advances in characterization, Industrial scale and formulation will be discussed.
This work aimed to produce PVA and PVA/Ag nanofibers ultra-high sensitivity photodetector by electrospinning. The electrospinning process was used to successfully prepare PVA nanofibers and a PVA-Ag nanofiber composite. FE-SEM, XRD, UV, I-V characterizations are used to study the morphological, structural, optical, and electrical properties of the material. In contrast, the PVA-Ag nanofiber composite film displayed a cubic structure with favored orientation (200) that indicated the presence of Ag NPs in the PVA-Ag nanofibers film. While the optical energy gap for PVA was 3.96 eV, it was only 2.14 eV for PVA-Ag nanofibers composite film, making this composite sensitive to visible light, particularly green light at 550 nm with a 65% photosens
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More