Preferred Language
Articles
/
joe-1755
Comparative Study of Water Desalination using Reverse Osmosis (RO) and Electro-dialysis Systems (ED): Review
...Show More Authors

The increasing drinking water demand in many countries leads to an increase in the use of desalination plants, which are considered a great solution for water treatment processes. Reverse osmosis (RO) and electro-dialysis (ED) systems are the most popular membrane processes used to desalinate water at high salinity. Both systems work by separating the ionic contaminates and disposing of them as a brine solution, but ED uses electrical current as a driving force while RO uses osmotic pressure. A direct comparison of reverse osmosis and electro-dialysis systems is needed to highlight process development similarities and variances. This work aims to provide an overview of previous studies on reverse osmosis and electro-dialysis systems related to membrane module and design processes; energy consumption; cost analysis; operational problems; efficiency of saline removal; and environmental impacts of brine disposal. RO system uses osmotic pressure as a driving force to force water through the membrane with less energy than other desalination systems. The enhancements in membrane materials and power recovery of the unit have massively decreased the price of RO units. ED system uses an electrical current to push dissolved ions across ion exchange membranes. The results of this review showed that desalination plants must be integrated with renewable energy to reduce power consumption and costs related to energy. Various technologies, including treatment processes and disposal methods, must be used to control concentrated solutions resulting from desalination processes because 5 to 33% of the total cost of the desalination process is associated with brine disposal.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 05 2024
Journal Name
Journal Of Medical And Health Studies
New Dosage Form of Insulin: Review Article
...Show More Authors

Many patients with advanced type 2 diabetes mellitus (T2DM) and all patients with T1DM require insulin to keep blood glucose levels in the target range. The most common route of insulin administration is subcutaneous insulin injections. There are many ways to deliver insulin subcutaneously, such as vials and syringes, insulin pens, and insulin pumps. Though subcutaneous insulin delivery is the standard route of insulin administration, it is associated with injection pain, needle phobia, lipodystrophy, noncompliance, and peripheral hyperinsulinemia. Therefore, the need exists to deliver insulin in a minimally invasive or noninvasive way and in the most physiological way. Inhaled insulin was the first approved noninvasive and alternative way

... Show More
Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Optimization of Drilling Well Design: A Review
...Show More Authors

Drilling well design optimization reduces total Authorization for Expenditures (AFE) by decreasing well constructing time and expense. Well design is not a constant pattern during the life cycle of the field. It should be optimized by continuous improvements for all aspects of redesigning the well depending on the actual field conditions and problems. The core objective of this study is to deliver a general review of the well design optimization processes and the available studies and applications to employ the well design optimization to solve problems encountered with well design so that cost effectiveness and perfect drilling well performance are achievable. Well design optimization processes include unconventional design(slimhole) co

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Thermodynamic and Kinetic Study of the Adsorption of Pb (II) from Aqueous Solution Using Bentonite and Activated Carbon
...Show More Authors

The adsorption of Pb(II) ions onto bentonite and activated carbon was investigated. The effects of pH, initial adsorbent dosage, contact time and temperature were studied in batch experiments. The maximum adsorption capacities for bentonite and activated carbon were 0.0364 and 0.015 mg/mg, respectively. Thermodynamic parameters such as Gibbs free energy change, Enthalpy change and Entropy change have been calculated. These thermodynamic parameters indicated that the adsorption process was thermodynamically spontaneous under natural conditions and the adsorption was endothermic in nature. Experimental data were also tested in terms of adsorption kinetics, the results showed that the adsorption processes followed well pseudo second- order

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
2015 Ieee Conference On Computational Intelligence In Bioinformatics And Computational Biology (cibcb)
Granular computing approach for the design of medical data classification systems
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Mon Oct 09 2023
Journal Name
2023 Ieee 34th International Symposium On Software Reliability Engineering Workshops (issrew)
Semantics-Based, Automated Preparation of Exploratory Data Analysis for Complex Systems
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jun 30 2003
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Liquid-Liquid Equilibria of Quaternary Systems Including Sulfonate at 293.15 K
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Nov 17 2021
Journal Name
International Journal Of Knowledge Management
Assessing the Success of the Perceived Usefulness for Knowledge Management Systems
...Show More Authors

Recently, Knowledge Management Systems (KMS) consider one of the major fields of study in educational institutions, caused by the necessity to identify their knowledge value and success. Hence, based on the updated DeLone and McLean’s Information Systems Success Model (DMISSM), this study set out to assess the success of the Perceived Usefulness of Knowledge Management Systems (PUKMS) in Iraqi universities. To achieve this objective, the quantitative method is selected as the research design. In total, 421 university administration staff members from 13 Iraqi private universities were conducted. This study highlights a number of significant results depending on structural equation modeling which confirms that system, information, and s

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Performance Analysis of different Machine Learning Models for Intrusion Detection Systems
...Show More Authors

In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Ieee Transactions On Industrial Electronics
Finite-Time Continuous Terminal Sliding Mode Control of Servo Motor Systems
...Show More Authors

In this article, a continuous terminal sliding mode control algorithm is proposed for servo motor systems. A novel full-order terminal sliding mode surface is proposed based on the bilimit homogeneous property, such that the sliding motion is finite-time stable independent of the system’s initial condition. A new continuous terminal sliding mode control algorithm is proposed to guarantee that the system states reach the sliding surface in finitetime. Not only the robustness is guaranteed by the proposed controller but also the continuity makes the control algorithm more suitable for the servo mechanical systems. Finally, a numerical example is presented to depict the advantages of the proposed control algorithm. An application in the rota

... Show More
View Publication
Scopus (224)
Crossref (200)
Scopus Clarivate Crossref