Preferred Language
Articles
/
alkej-159
Simulation Study of Mass Transfer Coefficient in Slurry Bubble Column Reactor Using Neural Network
...Show More Authors

 

The objective of this study was to develop neural network algorithm, (Multilayer Perceptron), based correlations for the prediction overall volumetric mass-transfer coefficient (kLa), in slurry bubble column for gas-liquid-solid systems. The Multilayer Perceptron is a novel technique based on the feature generation approach using back propagation neural network. Measurements of overall volumetric mass transfer coefficient were made with the air - Water, air - Glycerin and air - Alcohol systems as the liquid phase in bubble column of 0.15 m diameter. For operation with gas velocity in the range 0-20 cm/sec, the overall volumetric mass transfer coefficient was found to decrease with increasing solid concentration. From the experimental work 1575 data points for three systems, were collected and used to predicate  kLa. Using SPSS 17 software, predicting of overall volumetric mass-transfer coefficient (kLa) was carried out and an output of 0.05264 sum of square error was obtained for trained data and 0.01064 for test data.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Feb 25 2019
Journal Name
Iraqi Journal Of Physics
Simulation of indoor solar illumination system for a library hall in Baghdad city
...Show More Authors

A concept of indoor solar illumination is described and simulated. The solar illumination system is composed of a tracking primary reflector, a selective secondary reflector, a visible light guide and a scattering solid glass tube fixture. Each part of the solar illumination system is optically suited and compatible with other parts to realize high efficiency. The simulation is conducted for Baghdad city for a library hall. Two major days over a year are chosen to investigate the illumination system for acceptable visible light level for reading hall. The two days are: summer solstice day and winter solstice day at 8:00 AM and 12:00 PM for each. Research results showed that the design of the solar system is achieved on the base of minimu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
One and Two-Dimensional Hydraulic Simulation of a Reach in Al-Gharraf River
...Show More Authors

       

One and two-dimensional hydraulic models simulations are important to specify the hydraulic characteristics of unsteady flow in Al-Gharraf River in order to define the locations that facing problems and suggesting the necessary treatments. The reach in the present study is 58200m long and lies between Kut and Hai Cities. Both numerical models were simulated using HEC-RAS software, 5.0.4, with flow rates ranging from 100 to 350 m3/s. Multi-scenarios of gates openings of Hai Regulator were applied. While the openings of Al-Gharraf Head Regulator were ranged between 60cm to fully opened. The suitable manning roughness for the unsteady state was

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Wed Dec 04 2013
Journal Name
1st Post – Graduate Students Conference, Alnahrain University / College Of Engineering
Convection Heat Transfer in Horizontal Annulus Porous Media with Rotating Outer Cylinder
...Show More Authors

A numerical investigation of mixed convection in a horizontal annulus filled with auniform fluid-saturated porous medium in the presence of internal heat generation is carried out.The inner cylinder is heated while the outer cylinder is cooled. The forced flow is induced by thecold outer cylinder rotating at a constant angular velocity. The flow field is modeled using ageneralized form of the momentum equation that accounts for the presence of porous mediumviscous, Darcian and inertial effects. Discretization of the governing equations is achieved usinga finite difference method. Comparisons with previous works are performed and the results showgood agreement. The effects of pertinent parameters such as the Richardson number and internalRay

... Show More
Publication Date
Sun Dec 31 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Heat Transfer and Hydrodynamic in Internal Jacket Airlift Bioreactor with Microbubble Technology
...Show More Authors

   Integration of laminar bubbling flow with heat transfer equations in a novel internal jacket airlift bioreactor using microbubbles technology was examined in the present study. The investigation was accomplished via Multiphysics modelling to calculate the gas holdup, velocity of liquid recirculation, mixing time and volume dead zone for hydrodynamic aspect. The temperature and internal energy were determined for heat transfer aspect.

   The results showed that the concentration of microbubbles in the unsparged area is greater than the chance of large bubbles with no dead zones being observed in the proposed design.  In addition the pressure, due to the recirculation velocity of liquid around the draft

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 29 2025
Journal Name
Iraqi Journal Of Applied Physics
Fluorescence Energy Transfer Characteristics in Binary Acriflavine-Red Nut Lasing Dye Mixtures
...Show More Authors

View Publication
Publication Date
Fri Dec 31 2021
Journal Name
Political Sciences Journal
Role of the executive in federal experiences: a study of selected models
...Show More Authors

Receipt date:06/23/2020 accepted date:7/15/2020 Publication date:12/31/2021

Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License

The executive authority differs from one country to another, as it differs from a federal state to another according to the nature of the applied political systems, so this research focused on federal states according to their political systems, then going into the details of the executive authority and its role In the federal states by referring to the four federal experiments

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 30 2018
Journal Name
Iraqi Journal Of Science
Towards Generating Robust Key Based on Neural Networks and Chaos Theory
...Show More Authors

There are large numbers of weakness in the generated keys of security algorithms. This paper includes a new algorithm to generate key of 5120 bits for a new proposed cryptography algorithm for 10 rounds that combine neural networks and chaos theory (1D logistic map). Two methods of neural networks (NN) are employed as Adaline and Hopfield and the results are combined through several sequential operation. Carefully integrating high quality random number generators from neural networks and chaos theory to obtain suitable key for randomness and complexity.

View Publication Preview PDF
Publication Date
Thu Jan 01 2009
Journal Name
Computer And Information Science 2009
The Stochastic Network Calculus Methodology
...Show More Authors

Home Computer and Information Science 2009 Chapter The Stochastic Network Calculus Methodology Deah J. Kadhim, Saba Q. Jobbar, Wei Liu & Wenqing Cheng Chapter 568 Accesses 1 Citations Part of the Studies in Computational Intelligence book series (SCI,volume 208) Abstract The stochastic network calculus is an evolving new methodology for backlog and delay analysis of networks that can account for statistical multiplexing gain. This paper advances the stochastic network calculus by deriving a network service curve, which expresses the service given to a flow by the network as a whole in terms of a probabilistic bound. The presented network service curve permits the calculation of statistical end-to-end delay and backlog bounds for broad

... Show More
View Publication
Crossref (1)
Scopus Crossref