Catalytic microwave-assisted pyrolysis of biomass is gaining popularity as an alternative to fossil fuels due to health, environmental, climate, and economic issues. This study conducted a catalytic pyrolysis process of the Albizia plant's branches using an Iraqi clay catalyst (bentonite) focusing on the variables including the biomass-particle size, experimental time, microwave power level, and the catalyst-to-biomass ratio. The physical and chemical properties of the resulting biofuel were analyzed presented by HHV, acidity, density, viscosity, GC-MS, FTIR for bio-oil and SEM, EDX, BET, HHV, FTIR for biochar. The study revealed that addition of bentonite as a catalyst led to enhanced production of biogas produced from 5% to 45% and decreased the power level used from 700 W to 450 W. Also, it raised the production of bio-oil generated with less power level and duration time. The addition of catalyst also affected the characteristics of bio-oil produced such as reducing the acidity by increasing its pH from 5 to 5.7, lowering the viscosity from 4.8 to 3.3 cSt, and the density from 1045 to 1039.2 kg/m3. Adding catalyst increased the percentage of aromatic and alcoholic substances in the bio-oil which led to improve the calorific value from 19.5 to 23 MJ/kg. Additionally, the biochar properties also improved, where the surface area and pore volume increased from 0.5512 to 40.384 m2/g and 0.00011 to 0.0361cm3/g respectively. The higher heating value was raised from 23.5 to 25 MJ/kg also. CH4 is also increased from 3.6 to 8.6% which is one of the essential fuel gasses.
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
The integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period. &nb
... Show MoreSurveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion
In this study, a fast block matching search algorithm based on blocks' descriptors and multilevel blocks filtering is introduced. The used descriptors are the mean and a set of centralized low order moments. Hierarchal filtering and MAE similarity measure were adopted to nominate the best similar blocks lay within the pool of neighbor blocks. As next step to blocks nomination the similarity of the mean and moments is used to classify the nominated blocks and put them in one of three sub-pools, each one represents certain nomination priority level (i.e., most, less & least level). The main reason of the introducing nomination and classification steps is a significant reduction in the number of matching instances of the pixels belong to the c
... Show MoreTo maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show More