The power generation of solar photovoltaic (PV) technology is being implemented in every nation worldwide due to its environmentally clean characteristics. Therefore, PV technology is significantly growing in the present applications and usage of PV power systems. Despite the strength of the PV arrays in power systems, the arrays remain susceptible to certain faults. An effective supply requires economic returns, the security of the equipment and humans, precise fault identification, diagnosis, and interruption tools. Meanwhile, the faults in unidentified arc lead to serious fire hazards to commercial, residential, and utility-scale PV systems. To ensure secure and dependable distribution of electricity, the detection of such hazards is crucial in the early phases of the distribution. In this paper, a detailed review of modern approaches for the identification of DC arc faults in PV is presented. In addition, a thorough comparison is performed between various DC arc-fault models, characteristics, and approaches used for the identification of the faults.
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThe objective of this study was to investigate the prophylactic roles of human enteric derived Lactobacillus plantarum L1 (Ll) and Lactobacillus paracasei L2 (L2), on EHEC O157:H7 infection in rodent models (In vivo). The Lactobacillus suspensions (L1 and L2) were individually and orally administered to experimental rats at a daily two consecutives of 100 μl (108 CFU/ ml/rat) for up to two weeks. Thereafter, on the 8th day of experiment rats were orally challenged with one dose infection of EHEC (105 CFU/ml/rat). Animals mortality and illness symptoms have been monitored. There was no fatal EHEC infection in rats that had been pre‑colonized with the Lactobacillus strains, while most of EHEC infected rats were died (90%). The
... Show MoreAbstract
The methods of the Principal Components and Partial Least Squares can be regard very important methods in the regression analysis, whe
... Show MoreWith the increasing use of antibiotics around the world, the study and appreciation of antibiotics has become essential. An antibiotic formulation may include one or added active ingredients depending on the type and method of manufacturing the antibiotic. Antibiotics can only combat diseases of bacterial origin. As for viral diseases such as the common cold and influenza, antibiotics will not be able to combat them. The objective of this review is to digest the literature related to estimation of antibiotics and to show the methods that have been used in the estimation of the antibiotics (amoxicillin, ampicillin, cephalothin, carbenicillin, and cefotaxime) in medicinal preparations and a biological fluid for example blood
... Show MoreThis study is descriptive and theory of Dawn syndrome as the problem of research lies in the need to identify the identification of the causes of Dawn syndrome and its symptoms and methods of dealing with it, which has become a problem that needs treatment, especially after the numbers have become high in Iraq, which has not yet taken the necessary importance for treatment and care.
The objectives of the research were summarized in the identification of the most important causes of Dawn syndrome and its symptoms and diagnosis and ways or methods of dealing with people with Dawn syndrome in order to develop therapeutic plans for him.
... Show More
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More