In Indonesia, cattle feces (CF) and water hyacinth (WH) plants are abundant but have not been widely revealed. The use of microorganisms as decomposers in the fermentation process has not been widely applied, so researchers are interested in studying further. This study was to evaluate the effect of the combination of CF with WH on composting by applying white-rot fungal (WRF) (Ganoderma sp) microorganism as a decomposer. A number of six types of treatment compared to R1(ratio of CF:WH)(25%:75%)+WRF; R2(ratio of CF:WH)(50%:50%)+WRF; R3(ratio of CF:WH)(75%:25%)+WRF; R4(ratio of CF:WH)(25%:75%) without WRF; R5(ratio of CF:WH)(50%:50%) without WRF; R6(ratio of CF:WH)
... Show MoreThis article deals with the impact of including transverse ribs within the absorber tube of the concentrated linear Fresnel collector (CLFRC) system with a secondary compound parabolic collector (CPC) on thermal and flow performance coefficients. The enhancement rates of heat transfer due to varying governing parameters were compared and analyzed parametrically at Reynolds numbers in the range 5,000–13,000, employing water as the heat transfer fluid. Simulations were performed to solve the governing equations using the finite volume method (FVM) under various boundary conditions. For all Reynolds numbers, the average Nusselt number in the circular tube in the CLFRC system with ribs was found to be larger than that of the plain abs
... Show MoreAn experimental and numerical study was carried out to investigate the heat transfer by natural convection in a three dimensional annulus enclosure filled with porous media (silica sand) between two inclined concentric cylinders with (and without) annular fins attached to the inner cylinder under steady state condition. The experiments were carried out for a range of modified Rayleigh number (0.2 ≤Ra*≤ 11) and extended to Ra*=500 for numerical study and for annulus inclination angle of (δ = 0˚, 30˚, 60˚ and 90˚). The numerical study was to give the governing equation under assumptions that used Darcy law and Boussinesq’s approximation and then it was solved numerically using finite difference approximation. It was found that t
... Show MoreThis paper presents thermal characteristics analysis of a modified Closed Wet Cooling Tower (CWCT) based on heat and mass transfer principles to improve the performance of this tower in Iraq. A prototype of CWCT optimized by added packing was designed, manufactured and tested for cooling capacity of 9 kW. Experiments are conducted to explore the effects of various operational and conformational parameters on the thermal performance. In the test section, spray water temperature and both dry bulb temperature and relative humidity of the air measured at intermediate points of the heat exchanger and packing. Heat exchangers consist of four rows and eight columns for an inline tubes arrangement and six rows and five columns f
... Show MoreBy optimizing the efficiency of a modular simulation model of the PV module structure by genetic algorithm, under several weather conditions, as a portion of recognizing the ideal plan of a Near Zero Energy Household (NZEH), an ideal life cycle cost can be performed. The optimum design from combinations of NZEH-variable designs, are construction positioning, window-to-wall proportion, and glazing categories, which will help maximize the energy created by photovoltaic panels. Comprehensive simulation technique and modeling are utilized in the solar module I-V and for P-V output power. Both of them are constructed on the famous five-parameter model. In addition, the efficiency of the PV panel is established by the genetic algorithm
... Show MoreIt is proposed and studied a prey-predator system with a Holling type II functional response that merges predation fear with a predator-dependent prey's refuge. Understanding the impact of fear and refuge on the system's dynamic behavior is one of the objectives. All conceivable steady-states are investigated for their stability. The persistence condition of the system has been established. Local bifurcation analysis is performed in the Sotomayor sense. Extensive numerical simulation with varied parameters was used to explore the system's global dynamics. A limit cycle and a point attractor are the two types of attractors in the system. It's also interesting to note that the system exhibits bi-stability between these 2 types of attractors.
... Show More
Experimental investigation of the influence of inserting the metal foam to the solar chimney to induce natural ventilation are described and analyzed in this work. To carry out the experimental test, two identical solar chimneys (without insertion of metal foam and with insertion of metal foam) are designed and placed facing south with dimensions of length× width× air gap (2 m× 1 m× 0.2 m). Four incline angles are tested (20o,30o,45o,60o) for each chimney in Baghdad climate condition (33.3o latitude, 44.4o longitude) on October, November, December 2018. The solar chimney performance is investigated by experimentally recording absorber pl
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More