Preferred Language
Articles
/
joe-1089
Optimization and Modeling the Performance of a Mediator-less Microbial Fuel Cell using Butler-Volmer-Monod Model
...Show More Authors

In this study, a one-dimensional model represented by Butler-Volmer-Monod (BVM) model was proposed to compute the anode overpotential and current density in a mediator-less MFC system. The system was fueled with various organic loadings of real field petroleum refinery oily sludge to optimize the favorable organic loading for biomass to operate the suggested system. The increase in each organic loading showed higher resistance to electrons transport to the anode represented by ohmic loss. On the contrary, both activation and mass transfer losses exhibited a noticeable decrement upon the increased organic loadings. However, current density was improved throughout all increased loads achieving a maximum current density of 5.2 A/m3. The BVM model perfectly expressed the bioelectrochemical reactions in the anodic-chamber. The experimental measurements for all the studied organic loadings agreed with the model predicted values by an estimated determination factor (R2) of 0.96, proving the validity of the proposed mathematical model to express the anodic bioelectrochemical reactions in the MFC. Also, the sustainable power generated from each cycle was evaluated, and it was found that higher sustainable energy can be harvested from higher organic loading 1000 g/L, which achieved maximum sustainable energy of 0.83 W/m3.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Capability to a chive An Effective Marketing Performance In Banks: applied Study in a sample of Iraqi Banks
...Show More Authors

The marketing of banking service is considered to be one of the impotent fields which showed a universal inebriates . He research showed the comparison between the application of marketing in ideas and application for loot government and private Iraqi bank. The research comets of four parts; Mythology / the concept and the importance of Banking Marketing / Research applichlion/ Conelnion and  recommendation.

View Publication Preview PDF
Publication Date
Thu May 14 2015
Journal Name
International Journal Of Computer Applications
Performance Evaluation of Zigbee Routing Protocol under Various Conditions using OPNET Modeler
...Show More Authors

Zigbee, which has the standard IEEE 802.15.4. It is advisable method to build wireless personal area network (WPAN) which demands a low power consumption that can be produced by Zigbee technique. Our paper gives measuring efficiency of Zigbee involving the Physical Layer (PL) and Media Access Control (MAC) sub-layer , which allow a simple interaction between the sensors. We model and simulate two different scenarios, in the first one, we tested the topological characteristics and performance of the IEEE802.15.4 standard in terms of throughput, node to node delay and figure of routers for three network layouts (Star, Mesh and Cluster Tree) using OPNET simulator. The second scenario investigates the self-healing feature on a mesh

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 16 2022
Journal Name
2022 Muthanna International Conference On Engineering Science And Technology (micest)
Virtual Performance Evaluation of Net-Zero Energy Building (NZEB) Using BIM Analysis
...Show More Authors

View Publication
Scopus (8)
Crossref (8)
Scopus Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Engineering And Technology Journal
Performance Improvement of Multi-UserMC-CDMA system Using Discrete Hartly Transform Mapper
...Show More Authors

Future wireless communication systems must be able to accommodate a large number of users and simultaneously to provide the high data rates at the required quality of service. In this paper a method is proposed to perform the N-Discrete Hartley Transform (N-DHT) mapper, which are equivalent to 4-Quadrature Amplitude Modulation (QAM), 16-QAM, 64-QAM, 256-QAM, … etc. in spectral efficiency. The N-DHT mapper is chosen in the Multi Carrier Code Division Multiple Access (MC-CDMA) structure to serve as a data mapper instead of the conventional data mapping techniques like QPSK and QAM schemes. The proposed system is simulated using MATLAB and compared with conventional MC-CDMA for Additive White Gaussian Noise, flat, and multi-path selective fa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 30 2017
Journal Name
Journal Of Engineering
Enhancing Performance of Self–Compacting Concrete with Internal Curing Using Thermostone Chips
...Show More Authors

This paper is devoted to investigate the effect of internal curing technique on the properties of self-compacting concrete (SCC). In this study, SCC is produced by using silica fume (SF) as partial replacement by weight of cement with percentage of (5%), sand is partially replaced by volume with saturated fine lightweight aggregate (LWA) which is thermostone chips as internal curing material in three percentages of (5%, 10% and 15%) for SCC, two external curing conditions water and air. The experimental work was divided into three parts: in the first part, the workability tests of fresh SCC were conducted. The second part included conducting compressive strength test and modulus of rupture test at ages of (7, 28 and 90). The third part i

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
Assessment of Traditional Asphalt Mixture Performance Using Natural Asphalt from Sulfur Springs
...Show More Authors

This research utilized natural asphalt (NA) deposits from sulfur springs in western Iraq. Laboratory tests were conducted to evaluate the performance of an asphalt mixture incorporating NA and verify its suitability for local pavement applications. To achieve this, a combination of two types of NA, namely soft SNA and hard HNA, was blended to create a binder known as Type HSNA. The resulting HSNA exhibited a penetration grade that adhered to Iraqi specifications. Various percentages of NA (20%, 40%, 60%, and 80%) were added to petroleum asphalt. The findings revealed enhanced physical properties of HSNA, which also satisfied the requirements outlined in the Iraqi specifications for asphalt cement.

Consequently, HS

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
Assessment of Traditional Asphalt Mixture Performance Using Natural Asphalt from Sulfur Springs
...Show More Authors

This research utilized natural asphalt (NA) deposits from sulfur springs in western Iraq. Laboratory tests were conducted to evaluate the performance of an asphalt mixture incorporating NA and verify its suitability for local pavement applications. To achieve this, a combination of two types of NA, namely soft SNA and hard HNA, was blended to create a binder known as Type HSNA. The resulting HSNA exhibited a penetration grade that adhered to Iraqi specifications. Various percentages of NA (20%, 40%, 60%, and 80%) were added to petroleum asphalt. The findings revealed enhanced physical properties of HSNA, which also satisfied the requirements outlined in the Iraqi specifications for asphalt cement. Consequently, HSNA can serve as an

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
The relationship between the gap of knowledge and the strategic performance gap
...Show More Authors

Address the intellectual controversy nature of the gap of knowledge and the strategic performance gap. The researcher start off from this intellectual controversy to seek to test the nature of the relationship and impact between them across a sample of (61) academics in the colleges of business and economics at the universities in Baghdad ,as the more specialized in the fields of knowledge and the strategic performance, The researcher is attain to the existence of relationship and impact of knowledge gap in strategic performance gap, the research included four axes first went to the methodology and second to theoretical frame and the third to view and analyze the results and test hypotheses while the fourth was devoted to the con

... Show More
View Publication Preview PDF
Crossref