Citric acid is an essential ingredient for the manufacture of (12) key industrial chemicals. Citric acid use is increasing steadily with a high annual growth rate as a result of the development of ever more sophisticated applications. Citric acid is widely utilized in the food and pharmaceutical industries due to its low toxicity when compared to other acidulous. Other uses for citric acid can be found in cleaning supplies and detergents. Based on information from a review of the literature, Citric acid production substrates and methods for surface fermentation, submerged fermentation, solid-state fermentation, and international market expansion are all covered in the current review study. Finally, there is still much to learn about the
... Show MoreAbstract
Travel Time estimation and reliability measurement is an important issues for improving operation efficiency and safety of traffic roads networks. The aim of this research is the estimation of total travel time and distribution analysis for three selected links in Palestine Arterial Street in Baghdad city. Buffer time index results in worse reliability conditions. Link (2) from Bab Al Mutham intersection to Al-Sakara intersection produced a buffer index of about 36% and 26 % for Link (1) Al-Mawall intersection to Bab Al- Mutham intersection and finally for link (3) which presented a 24% buffer index. These illustrated that the reliability get worst for link
... Show MoreAbstract
The current study presents numerical investigation of the fluid (air) flow characteristics and convection heat transfer around different corrugated surfaces geometry in the low Reynolds number region (Re<1000). The geometries are included wavy, triangle, and rectangular. The effect of different geometry parameters such as aspect ratio and number of cycles per unit length on flow field characteristics and heat transfer was estimated and compared with each other. The computerized fluid dynamics package (ANSYS 14) is used to simulate the flow field and heat transfer, solve the governing equations, and extract the results. It is found that the turbulence intensity for rectangular extended surface was larg
... Show MoreThe Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreThe concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s
... Show MoreThe geochemical study of the Oligocene-Miocene succession Anah, Euphrates, and Fatha formations, western Iraq, was carried out to discriminate their depositional environments. Different major and trace patterns were observed between these formations. The major elements (Ca, Mg, Fe, Mn, K, and Na) and trace elements (Li, V, Cr, Co, Ni, Cu, Zn, Ga, Rb, Sr, Zr, Cs, Ba, Hf, W, Pb, Th, and U) are a function of the setting of the depositional environments. The reefal facies have lower concentrations of MgO, Li, Cr, Co, Ni, Ga, Rb, Zr, and Ba than marine and lagoonal facies but have higher concentrations of CaO, V, and Sr than it. Whereas dolomitic limestone facies are enriched V, and U while depletion in Li, Cr, Ni, Ga, Rb, Sr, Zr, Ba, an
... Show More