In this study, successive electrocoagulation (EC) and electro-oxidation (EO) processes were used to minimize some of the major pollutants in real wastewater, such as organics (detected by chemical oxygen demand (COD)), and turbidity. The wastewater utilized in the present study was collected from the Midland Refinery Company in Baghdad-Iraq. The performance of the successive batch EC-EO processes was studied by utilizing Graphite and Aluminum (Al) as monopolar anode electrodes and stainless steel (st.st.) as the cathode. The Taguchi experimental design approach was used to attain the best experimental conditions for COD reduction as a major response. Starting from chemical oxygen demand COD of (600 ppm), the effects of current density (C.D.) (10- 20 mA/cm2), pH (4- 10), time (2– 4 h), and NaCl concentration (1.5- 2.5 g/l) on the efficiency of COD reduction were examined. The results indicated that COD reduction increased with increasing C.D., NaCl conc., and electrolysis time and increased exponentially at pH (4). The best conditions for the treatment of this wastewater were: C.D. (20 mA/cm2), pH (4), time (4 h), and NaCl conc. (2.5 g/l). At these conditions, approximately 98.12 % of COD reduction was achieved with electrical energy consumption (ENC) of about 62.04 kWh/m3. The result of analysis of variance (ANOVA) revealed that the C.D. and pH have a higher influence on the performance of organics removal, while the time and NaCl conc. have a minor impact on COD Re%.
In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreIn this article, a continuous terminal sliding mode control algorithm is proposed for servo motor systems. A novel full-order terminal sliding mode surface is proposed based on the bilimit homogeneous property, such that the sliding motion is finite-time stable independent of the system’s initial condition. A new continuous terminal sliding mode control algorithm is proposed to guarantee that the system states reach the sliding surface in finitetime. Not only the robustness is guaranteed by the proposed controller but also the continuity makes the control algorithm more suitable for the servo mechanical systems. Finally, a numerical example is presented to depict the advantages of the proposed control algorithm. An application in the rota
... Show MoreInformation systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show More
An automatic text summarization system mimics how humans summarize by picking the most significant sentences in a source text. However, the complexities of the Arabic language have become challenging to obtain information quickly and effectively. The main disadvantage of the traditional approaches is that they are strictly constrained (especially for the Arabic language) by the accuracy of sentence feature functions, weighting schemes, and similarity calculations. On the other hand, the meta-heuristic search approaches have a feature tha
... Show MoreThe biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show More