This study investigates the potential of biogas recovery from used engine oil (UEO) by co-digestion with animals’ manure, including cow dung (CD), poultry manure (PM), and cattle manure (CM). The experimental work was carried out in anaerobic biodigesters at mesophilic conditions (37°C). Two groups of biodigesters were prepared. Each group consisted of 4 digesters. UEO was the main component in the first group of biodigesters with and without inoculum, whereby a mix of UEO and petroleum refinery oily sludge (ROS) was the component in the second group of biodigesters. The results revealed that for UEO-based biodigesters, maximum biogas production was 0.98, 1.23, 1.93, and 0 ml/g VS from UEO±CD, UEO±CM, UEO±PM, and U
... Show MoreThe aim of the research is to identify the impact of the dimensions of the European Excellence Model in evaluating the performance of the bank of the research sample, as well as to interpret which dimensions are more important to the banks of the research sample. Based on the dimensions of this model, the United Bank for Investment and Finance has chosen a research community, and has met with officials of the United Bank for Investment and Finance at various administrative levels to measure the practices of excellence management in the European model, and the analytical approach has been the case study and the construction of the checklist as a tool to collect information. The research has reached the most important results There is a discr
... Show MoreThe purpose of this study is to investigate the biostimulation effect of 532 nm CW laser on the metabolism of Saccharomyces cerevisiae yeast. Cells were irradiated by 532 nm Nd:YAG laser using 0.153 W/cm2 power density at 30, 45, 60,180 and 300 seconds exposure times in their respective orders. Intrafluorescence parameters were measured by detection the autofluorescence intensity, proliferation rate and Imaging the fluorescent mitochondria using confocal laser scanning microscope. The results showed that the 30 and 45 second exposure times seem to have stimulated changes in the cells that led to increase proliferation, viability and mitochondrial activity. Autofluorescence of cells increased after 45 and 60 seconds exposure time. After 3
... Show MoreThe research aims to derive the efficient industrial plans for Al – shaheed public company under risk by using Target MOTAD as a linear alternative model for the quadratic programming models.
The results showed that there had been a sort of (trade- off) between risk and the expected gross margins. And if the studied company strives to get high gross margin, it should tolerate risk and vice versa. So the management of Al- Shaheed Company to be invited to apply the suitable procedures in the production process, in order to get efficient plans that improves it's performance .
Gabriel Garcia Marquez, the Nobel laureate of literature in 1982, is one of the most famous Latin American writers who have been distinguished by the magic of realism. We can say the months in the world and he is almost the most controversial for many reasons and for these reasons he did not accept that his novels turn into movies Marquez agreed to turn one of his most important and most beautiful novels, "Love in the Time of Cholera," which he wrote in 1985 and agreed to convert to a film in 2006 after the novel was bought by the author for $ 3 million. Mike Noel to bring out
The urban Gentrification is an inclusive global phenomenon to restructure the cities on the overall levels, the research to propose a specific study about the concept of urban Gentrification in the cities and showcasing its, specifications, and results, and how to deal with the variables that occur on cities through improvements as part of urban renewal projects, then the general axis of the research is shrinked, choosing the urban centers as the most important areas that deal with the urban Gentrification process due to its direct connection with indivisuals and social changes, and to process the specific axis of the research theses and studies will be showcased that discuss the topic in different research directions, and emerged
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show More