This study was conducted in Animal Resources Department , College of Agriculture to estimate the effect of chemical and biological treatments to improve the nutritive value of poor quality roughages ( corn cobs and wild reed ) . The feeds were treated chemically with 4% NaoH solution ,whereas Aspergillus niger was used to ferment corn cobs and wild reed samples . The chemical analysis showed that protein percentages of corn cobs and wild reed was increased significantly (P<0.05) from 6.05% to 10.51% and 17.70% and from 3.10 %to 6.50% and 9.96% for both chemical and biological treatments respectively. The crude fiber percentages decreased significantly (P<0.05) from 29.19% and 26.10% to 23.60% and 20.10% for chemical treatment and was 20
... Show MoreThis research shows the problem of the economic development of underdeveloped countries in an unconventional way, as these papers explain the problems of the economic development. This research not only reviews the problems, but it illustrates them in a philosophical way, basis of the data of modernity, this mean it is a process of connecting between the absence of the modernity values and the failure of development in underdeveloped countries. The Search follows the descriptive approach to get to the goal of search by four main axes. The first axis includes clarifying modernity and its principles, the second axis includes clarifying the economic development , the third axis includes the features of the mod
... Show MoreIn this study, the spreading of the pandemic coronavirus disease (COVID-19) is formulated mathematically. The objective of this study is to stop or slow the spread of COVID-19. In fact, to stop the spread of COVID-19, the vaccine of the disease is needed. However, in the absence of the vaccine, people must have to obey curfew and social distancing and follow the media alert coverage rule. In order to maintain these alternative factors, we must obey the modeling rule. Therefore, the impact of curfew, media alert coverage, and social distance between the individuals on the outbreak of disease is considered. Five ordinary differential equations of the first-order are used to represent the model. The solution properties of the system ar
... Show MoreThe pure and Sb doped GeSe thin films have been prepared by thermal flash evaporation technique. Both the structural and optical measurement were carried out for as deposited and annealed films at different annealing temperatures.XRD spectra revealed that the all films have one significant broad amorphous peak except for pure GeSe thin film which annealed at 573 K, it has sharp peak belong to orthorhombic structure nearly at 2θ=33o . The results of the optical studies showed that the optical transition is direct and indirect allowed. The energy gap in general increased with increasing annealing temperature and decreased with increase the ratio of Sb dopant. The optical parameters such as refractive index, extinction coefficient and r
... Show MoreThe pure and Sb doped GeSe thin films have been prepared by thermal flash evaporation technique. Both the structural and optical measurement were carried out for as deposited and annealed films at different annealing temperatures.XRD spectra revealed that the all films have one significant broad amorphous peak except for pure GeSe thin film which annealed at 573 K, it has sharp peak belong to orthorhombic structure nearly at 2θ=33o. The results of the optical studies showed that the optical transition is direct and indirect allowed. The energy gap in general increased with increasing annealing temperature and decreased with increase the ratio of Sb dopant. The optical parameters such as refractive index, extinction coefficient and real and
... Show MoreTo improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading
... Show MoreThe Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show MoreIn the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreRecently Tobit Quantile Regression(TQR) has emerged as an important tool in statistical analysis . in order to improve the parameter estimation in (TQR) we proposed Bayesian hierarchical model with double adaptive elastic net technique and Bayesian hierarchical model with adaptive ridge regression technique .
in double adaptive elastic net technique we assume different penalization parameters for penalization different regression coefficients in both parameters λ1and λ2 , also in adaptive ridge regression technique we assume different penalization parameters for penalization different regression coefficients i
... Show More