In this study, a one-dimensional model represented by Butler-Volmer-Monod (BVM) model was proposed to compute the anode overpotential and current density in a mediator-less MFC system. The system was fueled with various organic loadings of real field petroleum refinery oily sludge to optimize the favorable organic loading for biomass to operate the suggested system. The increase in each organic loading showed higher resistance to electrons transport to the anode represented by ohmic loss. On the contrary, both activation and mass transfer losses exhibited a noticeable decrement upon the increased organic loadings. However, current density was improved throughout all increased loads achieving a maximum current density of 5.2 A/m3. The BVM model perfectly expressed the bioelectrochemical reactions in the anodic-chamber. The experimental measurements for all the studied organic loadings agreed with the model predicted values by an estimated determination factor (R2) of 0.96, proving the validity of the proposed mathematical model to express the anodic bioelectrochemical reactions in the MFC. Also, the sustainable power generated from each cycle was evaluated, and it was found that higher sustainable energy can be harvested from higher organic loading 1000 g/L, which achieved maximum sustainable energy of 0.83 W/m3.
Researchers often equate database accounting models in general and the Resources-Events-Agents (REA) accounting model in particular with events accounting as proposed by Sorter (1969). In fact, REA accounting, database accounting, and events accounting are very different. Because REA accounting has become a popular topic in AIS research, it is important to agree on exactly what is meant by certain ideas, both in concept and in historical origin. This article clarifies the analyzing framework of REA accounting model and highlights the differences between the terms events accounting, database accounting, semantically-modeled accounting, and REA accounting. It als
... Show MoreThe linear segment with parabolic blend (LSPB) trajectory deviates from the specified waypoints. It is restricted to that the acceleration must be sufficiently high. In this work, it is proposed to engage modified LSPB trajectory with particle swarm optimization (PSO) so as to create through points on the trajectory. The assumption of normal LSPB method that parabolic part is centered in time around waypoints is replaced by proposed coefficients for calculating the time duration of the linear part. These coefficients are functions of velocities between through points. The velocities are obtained by PSO so as to force the LSPB trajectory passing exactly through the specified path points. Also, relations for velocity correction and exact v
... Show MoreThe issue of image captioning, which comprises automatic text generation to understand an image’s visual information, has become feasible with the developments in object recognition and image classification. Deep learning has received much interest from the scientific community and can be very useful in real-world applications. The proposed image captioning approach involves the use of Convolution Neural Network (CNN) pre-trained models combined with Long Short Term Memory (LSTM) to generate image captions. The process includes two stages. The first stage entails training the CNN-LSTM models using baseline hyper-parameters and the second stage encompasses training CNN-LSTM models by optimizing and adjusting the hyper-parameters of
... Show MoreThe aim of human lower limb rehabilitation robot is to regain the ability of motion and to strengthen the weak muscles. This paper proposes the design of a force-position control for a four Degree Of Freedom (4-DOF) lower limb wearable rehabilitation robot. This robot consists of a hip, knee and ankle joints to enable the patient for motion and turn in both directions. The joints are actuated by Pneumatic Muscles Actuators (PMAs). The PMAs have very great potential in medical applications because the similarity to biological muscles. Force-Position control incorporating a Takagi-Sugeno-Kang- three- Proportional-Derivative like Fuzzy Logic (TSK-3-PD) Controllers for position control and three-Proportional (3-P) controllers for force contr
... Show MoreThis paper discusses an optimal path planning algorithm based on an Adaptive Multi-Objective Particle Swarm Optimization Algorithm (AMOPSO) for two case studies. First case, single robot wants to reach a goal in the static environment that contain two obstacles and two danger source. The second one, is improving the ability for five robots to reach the shortest way. The proposed algorithm solves the optimization problems for the first case by finding the minimum distance from initial to goal position and also ensuring that the generated path has a maximum distance from the danger zones. And for the second case, finding the shortest path for every robot and without any collision between them with the shortest time. In ord
... Show MoreThe research aims to a statement of specificity of the Controller of (academic achievement, specialty, job title, length of service, Gender) and its impact on performance, Through a proposed appraisal form includes three main axes and each axis including several specialized elements in the supervisory work in form (check list). as is the importance of research to enable officials of oversight bodies financial identify and diagnose performance Controller through what has this observer of the process of scientific properties when performing supervisory work. Be summarized problem of the research that the lack of regulatory institution with the Controller interesting in terms of the necessary characteristics and requirements and inv
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More