11 research outputs found

    A pressure-based method for monitoring leaks in a pipe distribution system: a review

    Get PDF
    Leakage from a pipe network possibly poses significant environmental destruction and economic losses due to the release of potential energy. While the pipe network may be planned and constructed to satisfy the requirements of rigorous conditions, it is quite hard to avoid the subsequent appearance of leakages in a pipeline during the system's lifetime. Pressure leak detection enables a fast and reliable action response which is necessary to minimise the damage. Many leak detection approaches have been previously suggested. These methods basically depend on numerical modelling and transient analysis, such as inverse transient analysis, time domain analysis and frequency domain analysis, the negative pressure method, etc. Many methods build upon the analysis of the variation of measured pressure, such as the pressure residual vector method. Hydraulic leak detection has the important advantage of being less costly and has a faster response compared to other leak detection approaches. In this work, various leak detection methods based on pressure are listed and the analysis is reviewed. Both steady state and unsteady state conditions are discussed. The advantages and disadvantages of each approach are mentioned. In addition, methods are included that are suitable for use in both the oil and water industries

    Nano-Engineered High-Performance Copper-Water Heat Pipes

    Get PDF
    Recently, heat pipes have gained an exceptional reputation as passive systems. They have become an attractive choice for many engineering applications due to their simple design, high rate of heat transfer, low weight, and low cost of maintenance [1]. A Heat pipe consists of a vacuumed shell filled partially with a compatible working fluid. Three main sections comprise a heat pipe: evaporator, adiabatic, and condenser section. The heat pipe utilizes the principle of evaporation and condensation for operations, i.e., the phase change of working fluid. Heat pipe allows high heat rates to transfer over considerable lengths with minimum temperature differences [2]

    Practical application of IOT and its implications on the existing software

    Get PDF
    The data management from end-to-end level is done by cloud-assisted IOT for its users and they keep a goal in increasing their number of users with the course of time. From saving the infiltration of data from both internal and external threats to the system, IOT is the best-proposed method used for securing the database. Connecting objects/individuals with the Internet via safe interaction is the main objective of IOT. It can assemble all the hardware devices that are designed to store data for an individual or an organization. The associated applications and the way in which it can be deployed in the present organization in order to optimize the current working system. This paper focuses on providing an overall systematic secured data sharing portal that is devoid of threats from internal as well as external entities. By using CIBPRE data encryption a major security reform is introduced by IOT in storing and sharing of data on a regular basis

    Watermarking in WAV Files Bases on Phase Coding

    Get PDF
    The growth of the network multimedia open the illegal ways for users to use the digital media without any hindrance or control. This state created, the need for the copyright protection of various digital media. WAV audio files is one of these media, these media file format itself has no built in copy protection controls. Other systems must be used to prevent illegal copying called watermarking. In this paper, we used the phase coding method to embed the watermark, by using FFT method in two ways. The first way used the block size of the wave data equal to (22) and the second way used the block size of the wave data equal to (23). The results of the above two ways shows that, when we use the first way the noise of the sound will be very smaller than the results of the second way. On the other hand the length of the watermark in second way will be longer than when use the first way. Finally, we can say that the two ways yield good results

    Identification key scheme to enhance network performance in wireless body area network

    Get PDF
    Wireless Body Area Network (WBAN) refers to a group of small intelligent electronic devices placed on the human body to monitor its vital signals. the efficiency of network performance in health care applications is one of the most important prerequisites for designing an effective surveillance system. However, none of the previous studies have succeeded in proposing an effective scheme that could cover the requirements for effective network performance or the development of the WBAN system capable of sending and receiving vital patient data efficiently. The aim of this paper is to enhance the performance of the network in WBAN. In addition, to verify the transfer of patient data from sensors on the body to receivers with the least value of possible packet loss, a solution is developed that can reduce the value of packet loss, end to end delay and increase the value of throughput, relying on confirmation and matching data between the sender and receiver devices. A new scheme known as the Identification Key Scheme (IKS) is proposed based on the newly available 402–405 MHz Medical Implant Communication Service (MICS). The analysis of the network performance was implemented in real WBAN dataset and used the Multi-Parameter Intelligent Monitoring for Intensive Care (MIMIC) database. MIMIC database included the data recorded from 90 Intensive Care Unit (ICU) patients. In this study, OMNET++ was used as the network simulation tool to design and evaluate the proposed scheme. The results showed that IKS was able to reduce number of packet loss and end to end delay with increased throughput. This is an indicator of the ability of IKS in providing efficient network performance between devices in the WBAN application

    Clustering algorithms subjected to K-mean and gaussian mixture model on multidimensional data set

    Get PDF
    This paper explored the method of clustering. Two main categories of algorithms will be used, namely k-means and Gaussian Mixture Model clustering. We will look at algorithms within thesis categories and what types of problems they solve, as well as what methods could be used to determine the number of clusters. Finally, we will test the algorithms out using sparse multidimensional data acquired from the usage of a video games sales all around the world, we categories the sales in three main standards of high sales, medium sales and low sales, showing that a simple implementation can achieve nontrivial results. The result will be presented in the form of an evaluation of there is potential for online clustering of video games sales. We will also discuss some task specific improvements and which approach is most suitable

    Sustainable optimizing WMN performance through meta-heuristic TDMA link scheduling and routing

    Get PDF
    Wireless mesh networks (WMNs) have become a popular solution for expanding internet service and communication in both urban and rural areas. However, the performance of WMNs depends on generating optimized time-division multiple access (TDMA) schedules, which distribute time into a list of slots called superframes. This study proposes novel meta-heuristic algorithms to generate TDMA link schedules in WMNs using two different interference/constraint models: multi-transmit-receive (MTR) and full-duplex (FD). The objectives of this study are to optimize the TDMA frame for packet transmission, satisfy the constraints, and minimize the end-to-end delay. The significant contributions of this study are: (1) proposing effective and efficient heuristic solutions to solve the NP-complete problem of generating optimal TDMA link schedules in WMNs; (2) investigating the new FD interference model to improve the network capacity above the physical layer. To achieve these objectives and contributions, the study uses two popular meta-heuristics, the artificial bee colony (ABC) and/or genetic algorithm (GA), to solve the known NP-complete problems of joint scheduling, power control, and rate control. The results of this study show that the proposed algorithms can generate optimized TDMA link schedules for both MTR and FD models. The joint routing and scheduling approach further minimizes end-to-end delay while maintaining the schedule's minimum length and/or maximum capacity. The proposed solution outperforms the existing solutions in terms of the number of active links, end-to-end delay, and network capacity. The research aims to improve the efficiency and effectiveness of WMNs in most applications that require high throughput and fast response time

    Isolation and Identification of Aspergillus Fumigatus From Feline Respiratory Infection in Baghdad Province

    Full text link
    Aspergillus fumigatus considered to be the most important species to cause respiratory infection cases in both humans and animals especially in cats in the last decades. In this study, we focused on the isolation and identification of Aspergillus fumigates by collecting 40 samples in deferent veterinary clinics and stray cats in Baghdad city, during the period (October 2021 to January 2022), all samples were cultured on Sabouraud dextrose agar and malt extract agar. The isolates identified by the laboratory methods, it's depend on macroscopic and microscopic appearance. The results showed that (40) swaps taken from the pharynx of infected cats, included: Aspergillus fumigatus 16 (40%), Aspergillus spp. 7 (17.5%), Aspergillus Niger 8 (20%), Penicillium spp. 5 (12.5%), Cryptococcus spp. 3 (7.5%), Fusarium spp. 1 (2.5%), and the presence of infection in female (62.5%) more than male (37.5%), this study indicated that the virulence and normal habitat of Aspergillus fumigatus make it the most important pathogen to cause respiratory infection and allergen in cats

    Role of vitamin D, interleukin-17A and interleukin-10 levels in women with recurrent miscarriage

    No full text
    Background: RPL is a common early pregnancy complication that is characterized as three or more pregnancy losses occurring before the 20th week of gestation. RPL is a common early pregnancy complication that is characterized as three or more pregnancy losses occurring before the 20th week of gestation. Recurrent miscarriage (RM) is a common occurrence, affecting 15–25% of all pregnancies. The study's goal was to assess vitamin D, interleukin-17a, and interleukin-10 levels in women who had several miscarriages and investigate the relationship between biomarkers to determine the final outcome of pregnancy. Methods: A case control study that included three study groups; thirty five women with RPL, thirty non-aborted pregnant (NAP) women and twenty five apparently healthy women. Patients were selected from those attending Bint Al-Huda Teaching Hospital and Suq Al-Shuyukh General Hospital at Thi-Qar Province (Iraq) during the period between October 2021 and July 2022 after stringent application of the eligibility criteria. Serum samples was collected form each subjects and was evaluated for serum VD, IL-17A and IL-10 levels via enzyme-linked immunosorbent assay (ELISA). Results: The results revealed that serum VD and IL-10 levels in the RPL group were significantly lower than in the healthy control group (HC)

    Proposed a New Framework Scheme for the PATH LOSS in Wireless Body Area Network

    No full text
    Recent technical developments in wi-fi networking, microelectronic integration and programming, sensors, and the Internet have enabled us to create and enforce a range of new Framework Scheme to fulfill the necessities of healthcare-related Wireless Body Area Network (WBAN). WBAN sensors continually screen and measure patients' indispensable signs and symptoms and tell them to scientific monitoring for diagnosis. WBAN has a range of applications, the most necessary of which is to help sufferers in final alive. The quality instance is the coronary heart implant sensor, which video display units the coronary heart sign and in this case transmits a sign continuously. This eliminates the want sufferers to go to the medical doctor as frequently. Instead, sufferers can take a seat at domestic and acquire an analysis and prescription for the disease. Today, a sizable effort is being made to increase low-power sensors and gadgets for utility in WBAN. We endorse a New Framework Scheme in this paper that addresses the route loss trouble in WBAN and discusses its penalties in depth. We apply the new Framework Scheme on three case scenarios that help us to get parameter that get it by measure vital information about the human body. On-body and intra-body conversation simulations have been conducted. On-Body conversation findings point out that the route loss between transmitter and receiver rises with growing distance and frequency
    corecore