Environmental pollution is experiencing an alarming surge within the global ecosystem, warranting urgent attention. Among the significant challenges that demand immediate resolution, effective treatment of industrial pollutants stands out prominently, which for decades has been the focus of most researchers for sustainable industrial development aiming to remove those pollutants and recover some of them. The liquid membrane (LM) method, specifically electromembrane extraction (EME), offers promise. EME deploys an electric field, reducing extraction time and energy use while staying eco-friendly. However, there's a crucial knowledge gap. Despite strides in understanding and applying EME, optimizing it for diverse industrial pollutant
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show More
This research aims to understand complexity management and its impact on the use of the dynamic capabilities of a sample of private colleges. Private colleges are currently facing many crises, changes, unrest and high competitive pressures. Which is sometimes difficult or even impossible to predict. The recruitment of dynamic capabilities is also one of the challenges facing senior management at private colleges to help them survive and survive. Thus, the problem of research was (there is a clear insufficiency of interest in Complexity Management and trying to employ it in improving the dynamic capabilities of Colleges that have been discussed?). A group of private colleges was selected as a
... Show MoreAbstract
The aim of the study was to examine the level of psychological pollution among Jordanian unemployed faculty of education graduates in public and private universities. The sample of the study consisted of (413) Jordanian male and female unemployed faculty of education graduates in 2017. The researcher administrated the psychological pollution scale on the sample of the study, consisting in the final format of (37) items distributing on (4) domains. Validity and reliability for the scale were obtained. The results of the study indicated that level of psychological pollution among Jordanian unemployed faculty of education graduates in public and private universities was high (M=3.48, SD=0.83). The results
... Show MoreThe technical activities designed to highlight the creations of students by providing activities appropriate to their abilities and capabilities within and outside the school, which is a way for the development of learning and learner behavior aimed at directing guidance educationally and artistically.As a result of the efforts of modern educational activities, art has become part of the philosophy of the modern school and part of the modern curriculum. Because it is enough to configure the practices and habits of a satisfactory and acceptable, and is characterized by precision, order and beauty.Through the researcher with a survey of previous studies that dealt with art activities and found that all studies have been confined to a calen
... Show More
The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThis article proposes a new technique for determining the rate of contamination. First, a generative adversarial neural network (ANN) parallel processing technique is constructed and trained using real and secret images. Then, after the model is stabilized, the real image is passed to the generator. Finally, the generator creates an image that is visually similar to the secret image, thus achieving the same effect as the secret image transmission. Experimental results show that this technique has a good effect on the security of secret information transmission and increases the capacity of information hiding. The metric signal of noise, a structural similarity index measure, was used to determine the success of colour image-hiding t
... Show MoreBimetallic Au –Pt catalysts supporting TiO2 were synthesised using two methods; sol immobilization and impregnation methods. The prepared catalyst underwent a thermal treatment process at 400◦ C, while the reduction reaction under the same condition was done and the obtained catalysts were identified with transmission electron microscopy (TEM) and energy-dispersive spectroscopy (EDS). It has been found that the prepared catalysts have a dimension around 2.5 nm and the particles have uniform orders leading to high dispersion of platinum molecules .The prepared catalysts have been examined as efficient photocatalysts to degrade the Crystal violet dye under UV-light. The optimum values of Bimetallic Au –
... Show MoreIn this work, mesoporous silica SBA-15 was prepared and functionalized with amine groups (i.e., NH2) to form NH2/SBA-15. The curcumin (CUR) was encapsulated into the surface and pore of NH2/SBA-15 to create CUR@NH2/SBA-15 as an efficient carrier in drug delivery systems (DDSs). The three samples (i.e., SBA-15, NH2/SBA-15, and CUR@NH2/SBA-15) were characterized. The study investigated the effect of the carrier dose, initial CUR concentration, pH, and contact time on the CUR loading efficiency (DLE%) via adsorption. The best DLE% for the SBA-15 and NH2/SBA-15 were found to be 45% and 89.7%, respectively. The Langmuir isotherm had a greater correlation coefficient (R2) of 0.998 for SBA-15. A pseudo-secondorder kinetic model seemed to fit well
... Show More