This paper discussed the solution of an equivalent circuit of solar cell, where a single diode model is presented. The nonlinear equation of this model has suggested and analyzed an iterative algorithm, which work well for this equation with a suitable initial value for the iterative. The convergence of the proposed method is discussed. It is established that the algorithm has convergence of order six. The proposed algorithm is achieved with a various values of load resistance. Equation by means of equivalent circuit of a solar cell so all the determinations is achieved using Matlab in ambient temperature. The obtained results of this new method are given and the absolute errors is demonstrated.
This research aims to design a high-speed laser diode driver and photodetector, the result is the
design of the high-speed laser diode driver with a short pulse of 10 ns at 30 KHz frequency and the
delivered maximum pulse voltage is 5.5 mV. Also, its optical output power of the laser diode driver is
about 2.529 mW for the centroied wavelength 1546.7 nm with FWHM of 286 pm and (1270-1610) nm.
The design of the circuit based on bipolar transistor where the input pulse signal is simply generated by
an arduino kit with 15 kHz frequency and then compensated to trigger to small signal amplifier which
was is simply NPN C3355 transistor and the output is a current driver to the laser diode. OptiSystem
software and Electronic
The present study was conducted on 20 patients suffering from different types of lesion like
pyogenic granuloma, peripheral giant cell granuloma, mucoceles, pregnancy tumour, Fordyce's granules
and irritating fibroma.The cases were selected from outpatient clinic of the Al Kydhemya Teaching
Hospital. Patients were treated by diode laser (810±20 nm) at the affected areas of the oral cavity with
continuous contact focused mode until excision of the lesion with coagulation of the oozing area after
excision. Patients were followed up after 2 days, 7 days and 2 weeks to assess healing process and any
post operative complication. Some of undiagnosed lesion sent for histopathological examination. No
serious complications w
The Ant System Algorithm (ASA) is a member of the ant colony algorithms family in swarm intelligence methods (part of the Artificial Intelligence field), which is based on the behavior of ants seeking a path and a source of food in their colonies. The aim of This algorithm is to search for an optimal solution for Combinational Optimization Problems (COP) for which is extremely difficult to find solution using the classical methods like linear and non-linear programming methods.
The Ant System Algorithm was used in the management of water resources field in Iraq, specifically for Haditha dam which is one of the most important dams in Iraq. The target is to find out an efficient management system for
... Show MoreSelf-Assertion is the individual ability to express any emotion well, except the anxiety. The decrease of the individuals asserting behavior makes them face many difficulties that prevent their social adjustment. Moreover it reflexes many negative behavioral and physical cases. The individual, who fails to express his or her negative feelings in required situations, feels with dissatisfaction, loneliness, depression, anxiety, social anxiety, conflict, and psychological disorder.
Accordingly, the importance of this study is represented in studying the self-assertion and studying the university students who reflect the strength of society.
The following are the two aims of the study:
1. Construct an asserting behavior scale.
2.
In this paper, a mathematical model for the oxidative desulfurization of kerosene had been developed. The mathematical model and simulation process is a very important process due to it provides a better understanding of a real process. The mathematical model in this study was based on experimental results which were taken from literature to calculate the optimal kinetic parameters where simulation and optimization were conducted using gPROMS software. The optimal kinetic parameters were Activation energy 18.63958 kJ/mol, Pre-exponential factor 2201.34 (wt)-0.76636. min-1 and the reaction order 1.76636. These optimal kinetic parameters were used to find the optimal reaction conditions which
... Show MoreGypseous soil, which covers vast area in west, middle, east and south west regions of Iraq exhibit acceptable strength properties when dry, but it is weak and collapsible when it comes in touch with moisture from rain or other sources. When such weak soil is adopted for earth reinforced embankment construction, it may exhibit hazardous situation. Gypseous soil was investigated for the optimum liquid asphalt requirements of both cutback and emulsion using the one-dimensional unconfined compression strength test. The optimum fluid content was 13% (7% of cutback with 6% water content), and 17% (9% of emulsion with 8% water content). A laboratory model box of 50x50x25 cm was used as a representative of embankment; soil or asphalt stabilize
... Show MoreIn a common language based on interpretation and diagnosis in the symbols and signs, the subject of Sufism and artistic semiotics is manifested in the construction and intensity of the reading of the text and the dismantling of its intellectual systems.
The emergence of Sufism in its religious features and the spiritual revelations related to the divine love of life in absolute reality, And images and language in a stream of intellectual and artistic unique and harmonious communicates with the subject of the themes of the Arab literature and its implications, but it is separated by a special entity signals and symbols related to the mysticism and worship.
The unleashing of the imagination and the diagnosis,
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreToday’s academics have a major hurdle in solving combinatorial problems in the actual world. It is nevertheless possible to use optimization techniques to find, design, and solve a genuine optimal solution to a particular problem, despite the limitations of the applied approach. A surge in interest in population-based optimization methodologies has spawned a plethora of new and improved approaches to a wide range of engineering problems. Optimizing test suites is a combinatorial testing challenge that has been demonstrated to be an extremely difficult combinatorial optimization limitation of the research. The authors have proposed an almost infallible method for selecting combinatorial test cases. It uses a hybrid whale–gray wol
... Show MoreArtificial fish swarm algorithm (AFSA) is one of the critical swarm intelligent algorithms. In this
paper, the authors decide to enhance AFSA via diversity operators (AFSA-DO). The diversity operators will
be producing more diverse solutions for AFSA to obtain reasonable resolutions. AFSA-DO has been used to
solve flexible job shop scheduling problems (FJSSP). However, the FJSSP is a significant problem in the
domain of optimization and operation research. Several research papers dealt with methods of solving this
issue, including forms of intelligence of the swarms. In this paper, a set of FJSSP target samples are tested
employing the improved algorithm to confirm its effectiveness and evaluate its ex