Microbial fuel cell is a device that uses the microorganism metabolism for the production of electricity under specific operating conditions. Double chamber microbial fuel cell was tested for the use of two cheap electrode materials copper and aluminum for the production of electricity under different operating conditions. The investigated conditions were concentration of microorganism (yeast) (0.5- 2 g/l), solutions temperature (33-45 oC) and concentration of glucose as a substrate (1.5- 6 g/l). The results demonstrated that copper electrode exhibit good performance while the performance of aluminum is poor. The electricity is generated with and without the addition of substrate. Addition of glucose substrate up to 3 g/l increased the produced current but with further increase of the amount of substrate, the current generated decreases. The optimum temperature for electricity production was found to be 36 oC.
The Islamic Bank of Al-Nahrain offers a formula for financing the purchase of real estate through a deferred sale contract, through Murabaha to the order to buy, and the payment of the price is in the form of instalments that include (the purchase price of the profit and the mutual agreement on the real estate). This research aims to show the reflection of real estate murabaha on the bank's investments, by measuring the effect of real estate murabaha on the profits achieved by the Islamic Bank of Al-Nahrain Bank. The growth of 'real estate murabaha' realized from the 'amounts granted by Bank X, in addition to analyzing the financial ratios of profitability indicators, including (return on deposits Y2) and for the years (2016 - 20
... Show MoreThis research represents a practical attempt applied to calibrate and verify a hydraulic model for the Blue Nile River. The calibration procedures are performed using the observed data for a previous period and comparing them with the calibration results while verification requirements are achieved with the application of the observed data for another future period and comparing them with the verification results. The study objective covered a relationship of the river terrain with the distance between the assumed points of the dam failures along the river length. The computed model values and the observed data should conform to the theoretical analysis and the overall verification performance of the model by comparing i
... Show MoreRecent research looking for acknowledgment of strategically influence of Robinson and self question at progressing the reading comprehension for students of sixth class .
To achieve research goal so the researcher mentally chose primary sixth class at the school (Tashti the primary) that followed education directorate of province (Jamjamal)/Suliymania for the scholastic year 2012-2013 as application field for their experiment of boys' number reached to (95) (female and male)students in reality (32) of the first experimental group and (31) student (female and male) from controlled group, the researcher rewarded between of three variable groups (timing period, intelligence ,Kurdish language degr
... Show MoreCharge transfer complex formation method has been applied for the spectrophotometric determination of erythromycin ethylsuccinate, in bulk sample and dosage form. The method was accurate, simple, rapid, inexpensive and sensitive depending on the formed charge- transfer complex between cited drug and, 2,3- Dichloro-5,6-dicyano-p- benzoquinone (DDQ) as a chromogenic reagent. The formed complex shows absorbance maxima at 587 nm against reagent blank. The calibration graph is linear in the ranges of (10 - 110) μg.mL-1 with detection limit of 0.351μg.mL-1. The results show the absence of interferences from the excipients on the determination of the drug. Therefore the proposed method has been successfully applied for the determination of eryth
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThis research represents a practical attempt applied to calibrate and verify a hydraulic model for the Blue Nile River. The calibration procedures are performed using the observed data for a previous period and comparing them with the calibration results while verification requirements are achieved with the application of the observed data for another future period and comparing them with the verification results. The study objective covered a relationship of the river terrain with the distance between the assumed points of the dam failures along the river length. The computed model values and the observed data should conform to the theoretical analysis and the overall verification performance of the model by comparing it with anothe
... Show MoreThis paper is concerned with pre-test single and double stage shrunken estimators for the mean (?) of normal distribution when a prior estimate (?0) of the actule value (?) is available, using specifying shrinkage weight factors ?(?) as well as pre-test region (R). Expressions for the Bias [B(?)], mean squared error [MSE(?)], Efficiency [EFF(?)] and Expected sample size [E(n/?)] of proposed estimators are derived. Numerical results and conclusions are drawn about selection different constants included in these expressions. Comparisons between suggested estimators, with respect to classical estimators in the sense of Bias and Relative Efficiency, are given. Furthermore, comparisons with the earlier existing works are drawn.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe present work aimed to study the efficiency of nanofiltration (NF) and reverseosmosis (RO) process for water recovery from electroplating wastewater and study the factors affecting the performance of two membrane processes. Nanofiltration and reverse osmosismembranes are made from polyamide as spiral wound module. The inorganic materials ZnCl 2 CuCl2 .2H2O, NiCl.2.6H2O and CrCl3.6H2O were used as feed solutions. The operating parametersstudied were: operating time, feed concentrations for heavy metal ions, operating pressure, feed flow rate, feed temperature and feed pH. The experimental results showed, the permeateconcentration increased and water flux decreased with increase in time from 0 to 70 min. Thepermeate concentrations incre
... Show More