Lead-acid batteries have been used increasingly in recent years in solar power systems, especially in homes and small businesses, due to their cheapness and advanced development in manufacturing them. However, these batteries have low voltages and low capacities, to increase voltage and capacities, they need to be connected in series and parallel. Whether they are connected in series or parallel, their voltages and capacities must be equal otherwise the quality of service will be degraded. The fact that these different voltages are inherent in their manufacturing, but these unbalanced voltages can be controlled. Using a switched capacitor is a method that was used in many methods for balancing voltages, but their responses are slow. To increase the response and control of the balancing process, this research proposes a novel technique that consists of a dynamic capacitor for controlling the unbalanced voltages of series-connected lead-acid batteries. The proposed technique uses a main capacitor and an inductor with two switches their on/off states are controlled through a pulse width modulation. The technique is designed and validated using MATLAB/Simulink and the results for different cases are compared with other techniques such as switched capacitor technique. Results show that the proposed method promised the balancing control in a shorter time and better performance than other techniques which are crucial in the battery’s voltage balancing.
The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreThe corrosion inhibition effect of a new furan derivative (furan-2-ylmethyl sulfanyl acetic acid furan-2-ylmethylenehydrazide) on mild steel in 1.0 M HCl was investigated using corrosion potential (ECORR) and potentiodynamic polarization. The obtained results indicated that the new furan derivative (furan-2-ylmethyl sulfanyl acetic acid furan-2-ylmethylenehydrazide) (FSFD) has a promising inhibitive effects on the corrosion of mild steel in 1.0 M HCl across all of the conditions examined. The density functional theory (DFT) study was performed on the new furan derivative (FSFD) at the B3LYP/6-311G (d, p) basis set level to explore the relation between their inhibition efficiency and molecular electro
The avoidance strategy of prey to predation and the predation strategy for predators are important topics in evolutionary biology. Both prey and predators adjust their behaviors in order to obtain the maximal benefits and to raise their biomass for each. Therefore, this paper is aimed at studying the impact of prey’s fear and group defense against predation on the dynamics of the food-web model. Consequently, in this paper, a mathematical model that describes a tritrophic Leslie-Gower food-web system is formulated. Sokol-Howell type of function response is adapted to describe the predation process due to the prey’s group defensive capability. The effects of fear due to the predation process are considered in the first two levels
... Show MoreIn this study, we set up and analyze a cancer growth model that integrates a chemotherapy drug with the impact of vitamins in boosting and strengthening the immune system. The aim of this study is to determine the minimal amount of treatment required to eliminate cancer, which will help to reduce harm to patients. It is assumed that vitamins come from organic foods and beverages. The chemotherapy drug is added to delay and eliminate tumor cell growth and division. To that end, we suggest the tumor-immune model, composed of the interaction of tumor and immune cells, which is composed of two ordinary differential equations. The model’s fundamental mathematical properties, such as positivity, boundedness, and equilibrium existence, are exami
... Show MoreThe use of biopolymer material Chitosan impregnated granular activated carbon CHGAC as adsorbent in the removal of lead ions pb.2+ from aqueous solution was studied using batch adsorption mode. The prepared CHGAC was characterized by Scanning Electronic Microscopy (SEM) and atomic-absorption pectrophotometer. The adsorption of lead ions onto Chitosan-impregnated granular activated carbon was examined as a function of adsorbent weight, pH and
contact time in Batch system. Langmuir and Freundlich models were employed to analyze the resulting experimental data demonstrated that better fitted by Langmuir isotherm model than Freundlich model, with good correlation coefficient. The maximum adsorption capacity calculated f
Buckling analysis of a laminated composite thin plate with different boundary conditions subjected to in-plane uniform load are studied depending on classical laminated plate theory; analytically using (Rayleigh-Ritz method). Equation of motion of the plates was derived using the principle of virtual work and solved using modified Fourier displacement function that satisfies general edge conditions. The eigenvalue problem generated by using Ritz method, the set of linear algebraic equations can be solved using MATLAB for symmetric and anti-symmetric, cross and angle-ply laminated plate considering some design parameters such as aspect ratios, number of layers, lamination type and orthotropic ratio. The results obtained g
... Show MoreAbstract:
The research aims to monitor the image of the man in the group (The Cart and the Rain) by the storyteller (Badiaa Amin); With the aim of highlighting an aspect of feminist writing, especially with regard to the relationship of women to men, and determining the form adopted by the storyteller in drawing the features of men.
The research used the descriptive-analytical method in the space of its textual formation, which aims to stand on the text and deconstruct its narrative significance. To provide a comprehensive picture of it.
Three images of the man appeared in the group's stories, represented by (the authoritarian, the negative, and the positive), and the image of the authoritarian ma
... Show MoreA Modified version of the Generlized standard addition method ( GSAM) was developed. This modified version was used for the quantitative determination of arginine (Arg) and glycine ( Gly) in arginine acetyl salicylate – glycine complex . According to this method two linear equations were solved to obtain the amounts of (Arg) and (Gly). The first equation was obtained by spectrophotometic measurement of the total absorbance of (Arg) and (Gly) colored complex with ninhydrin . The second equation was obtained by measuring the total acid consumed by total amino groups of (Arg) and ( Gly). The titration was carried out in non- aqueous media using perchloric acid in glacial acetic acid as a titrant. The developed metho
... Show MoreThe study aims at finding out the effect of the lead time strategy on the first intermediate class pupils' achievement in geography The partial experimental design of two groups, experimental and control, with pre-post tests is used. The sample is represented in (73) female pupils. The sample is divided into two groups (37) experimental group and (36) control one. The sam ple is selected from first intermediate class pupils ( Al Batol intermediate school for girls) Baghdad Al-karkh-3, for academic year 2015-2016 The researcher has equalized the two groups in several variables: the previous achievement tests, intelligence, age in months, the scores of geography test of first course
Image segmentation can be defined as a cutting or segmenting process of the digital image into many useful points which are called segmentation, that includes image elements contribute with certain attributes different form Pixel that constitute other parts. Two phases were followed in image processing by the researcher in this paper. At the beginning, pre-processing image on images was made before the segmentation process through statistical confidence intervals that can be used for estimate of unknown remarks suggested by Acho & Buenestado in 2018. Then, the second phase includes image segmentation process by using "Bernsen's Thresholding Technique" in the first phase. The researcher drew a conclusion that in case of utilizing
... Show More