Preferred Language
Articles
/
joe-1089
Optimization and Modeling the Performance of a Mediator-less Microbial Fuel Cell using Butler-Volmer-Monod Model
...Show More Authors

In this study, a one-dimensional model represented by Butler-Volmer-Monod (BVM) model was proposed to compute the anode overpotential and current density in a mediator-less MFC system. The system was fueled with various organic loadings of real field petroleum refinery oily sludge to optimize the favorable organic loading for biomass to operate the suggested system. The increase in each organic loading showed higher resistance to electrons transport to the anode represented by ohmic loss. On the contrary, both activation and mass transfer losses exhibited a noticeable decrement upon the increased organic loadings. However, current density was improved throughout all increased loads achieving a maximum current density of 5.2 A/m3. The BVM model perfectly expressed the bioelectrochemical reactions in the anodic-chamber. The experimental measurements for all the studied organic loadings agreed with the model predicted values by an estimated determination factor (R2) of 0.96, proving the validity of the proposed mathematical model to express the anodic bioelectrochemical reactions in the MFC. Also, the sustainable power generated from each cycle was evaluated, and it was found that higher sustainable energy can be harvested from higher organic loading 1000 g/L, which achieved maximum sustainable energy of 0.83 W/m3.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 26 2022
Journal Name
Iraqi Journal Of Science
A Mathematical Model for Iraqi Airways Company about Evaluating Its Objectives and Strategies
...Show More Authors

In this paper, we introduced a mathematical model for Iraqi Airways Company about evaluating its objectives and strategies. First, we studied Iraqi Airways schedules with different departure cities for each airline path. Then, we applied some fuzzy integrals for determining the best airline path.

View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Toward Improving BIM Acceptance in FM: A Conceptual Model Integrating TTF and TAM
...Show More Authors

Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
Effects of international variables on the principle of citizenship in Arab countries: "Kuwait as a Model"
...Show More Authors

The principle of citizenship has international dimensions that affect the application of the principle, such as the structure of the international system, and the control of the concepts of globalization, international organizations which played an important role in the consolidation of this principle.

The problem of the study revolves around the effects of international variables on the principle of citizenship in Kuwait during the period 1991-2018.

The study used several indicators, such as: the rule of law, achieving the principle of separation of powers, the right to form parties, the application of the law of nationality, and racial discrimination, women's rights, and freedom of expression.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 13 2021
Journal Name
Iraqi Journal Of Science
The Use of CUSB Model to Simplify Business Plans the Case of the Promotion of A Heritage Site in Morocco
...Show More Authors

In today‟s fierce competitive world, entrepreneurship has taken an upswing because business owners are facing a technological challenge in which uniqueness and particularity are key elements to detour rivals. In this essence, entrepreneurs have to go by not only developing business plans but also a deep analysis of their environment.
Business plans for entrepreneurs can take different models depending on the party that will evaluate its elements based on its requirements. However, there exists a basic format that most entrepreneurs follow. Because of time constraints, business owners are urging its usefulness and so are the investors. Business plans are all about nailing down the business idea into writing and analysis, while th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Sep 08 2022
Journal Name
Chalcogenide Letters
Synthesis and characterization of Cu2S:Al thin films for solar cell applications
...Show More Authors

In this work Nano crystalline (Cu2S) thin films pure and doped 3% Al with a thickness of 400±20 nm was precipitated by thermic steaming technicality on glass substrate beneath a vacuum of ~ 2 × 10− 6 mbar at R.T to survey the influence of doping and annealing after doping at 573 K for one hour on its structural, electrical and visual properties. Structural properties of these movies are attainment using X-ray variation (XRD) which showed Cu2S phase with polycrystalline in nature and forming hexagonal temple ,with the distinguish trend along the (220) grade, varying crystallites size from (42.1-62.06) nm after doping and annealing. AFM investigations of these films show that increase average grain size from 105.05 nm to 146.54 nm

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 30 2021
Journal Name
College Of Islamic Sciences
Al-Hajjaj in pre-Islamic poetry hangs Imru 'al-Qays and the Twrfa of Ibn al-Abd as a model
...Show More Authors

The topic of (pilgrims) of the old and modern subjects at the same time, as it extends his foot and is associated with the beginning of speech and argument, a modern because it is based on studies and research (and the theory of pilgrims) from (Austin and Cyril) through (Charles Breman) to (Aristotle) ), It is worth mentioning here to mention the role of (Hazem al - Qartagni) in mentioning the value of the pilgrimage of hair and saying the use of persuasion in the hair, is palatable and acceptable. Hence our research applied these views, and we chose the pendants as a model for that matter.

View Publication Preview PDF
Publication Date
Sat Oct 16 2021
Journal Name
Energies
Performance Analysis of a Solar Cooling System with Equal and Unequal Adsorption/Desorption Operating Time
...Show More Authors

In solar-thermal adsorption/desorption processes, it is not always possible to preserve equal operating times for the adsorption/desorption modes due to the fluctuating supply nature of the source which largely affects the system’s operating conditions. This paper seeks to examine the impact of adopting unequal adsorption/desorption times on the entire cooling performance of solar adsorption systems. A cooling system with silica gel–water as adsorbent-adsorbate pair has been built and tested under the climatic condition of Iraq. A mathematical model has been established to predict the system performance, and the results are successfully validated via the experimental findings. The results show that, the system can be operational

... Show More
View Publication
Scopus (10)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Journal Of Engineering
DESIGN OF A VARIABLE GAIN NONLINEAR FUZZY CONTROLLER AND PERFORMANCE ENHANCEMENT DUE TO GAIN VARIATION
...Show More Authors

In this paper, variable gain nonlinear PD and PI fuzzy logic controllers are designed and the effect of the variable gain characteristic of these controllers is analyzed to show its contribution in enhancing the performance of the closed loop system over a conventional linear PID controller. Simulation results and time domain performance characteristics show how these fuzzy controllers outperform the conventional PID controller when used to control a nonlinear plant and a plant that has time delay.