The current research includes the adsorption of Rhodmine-B Dye on the surface of Citrus Leaves using the technique of UV. Vis spectrophotometer to determine data of quantitative adsorption at various contact time, ionic strength, PH and temperature conditions. As a function of temperatures 25,35,45,55 0C, the dsorption phenomenon was examined, and the results showed that Rhodamine-B adsorption Citrus leaves rose with increasing temperatures on the surface (endothermic process). Using various NaCl solution concentrations, the effect of ionic strength on adsorption has also been studied. Increasing the importance of ionic strength has been shown to improve the amount of adsorption of Rhodamine-B on citrus leaves at constant temperatures.The quantity of Rh-B dye that was adsorbed on the citrus leaves was increased with increasing the PH of the solution in rang 3-7. Then the results were subjected to the practical results obtained with the use isotherms of the Langmuir, Frendelsh, and Temkin. The results can be shown that the isotherm suitable for adsorption applies to Ferndelsh and Temkin. The thermodynamic functions (the amount of change in enthalpy, the amount of change in entropy and the amount of change in the free energy of Gibbs) were also studied, and it was found that the thermodynamic results of the adsorption process of the Rhodamine-B dye on the powder of citrus leaves are endothermic and an automatic adsorption process.
With the growing use of electronic commerce has worked many companies, especially public shareholding to take advantage of them treated in the trade, so that the e-commerce part of the corporate environment, and this has made a career of accounting and auditing facing new challenges to the sophistication of the information and the rapid growth in the market for electronic commerce. And raised many questions about the ability of the audit profession to facing these challenges and how to audit operations of e-commerce and how to give confidence on websites, this sense it has become necessary keep the internal control systems of this technology and what has caused changes to the accounting system, and evolve to fit the developments that hav
... Show MoreThe characteristic of our time is the tremendous technological progress and the wide use of the Internet. Children have had a large share of this progress.as they are becoming fond of having the technological equipment of tablets and mobile phones which become indispensable for these children cannot do without them .
Recently, the phenomenon of using mobile phones and tablets by children has become more widespread, and the society in general and parents, in particular, have ignored the reasons for their health .Despite the many advantages and benefits for children who are well trained to use these devices properly that have enhanced their cognitive and social abilities, there are many disadvantages that could harm children's growth if
This study aimed at analyzing and studying the strategic and geopolitical importance of the Sahel region, which increased the regional competition for the resources of the region, especially the energy resources that have been and continue to be one of the axes of conflict and competition between these forces.
The researcher tried to review the competition between the international force, France, the United States of America, China, Algeria and Libya, and the African coast. We note that there is a positive correlation between the severity of the conflict and the intensity of the competition of the major powers to control the countries of the region and the extent of political and economic stability These countries are directly affecte
Much has been written about Baghdad in the history books and documents ,about the Origin of its call , Reality ,history ,peoples ,Rulers and all that have passed since the beginning of creation and so far...
The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreThe design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreAbstract
The developments of technology and information that is sweeping the world based on the factors of pressure on the accounting profession in general, and the authors of the accounting information. That becouse the makers of administrative decisions have become in need of new information fit and the environmental situation of the new competition and try to enter new markets,
... Show MoreSteganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.
مشكلة البحث واهميته:-
اخذ موضوع العولمة قدراً وافياً من الاهتمام سواء على المستوى الاكاديمي او على مستوى اجهزة الاعلام والرأي العام ومختلف التيارات السياسية والاقتصادية والاجتماعية ، فلا يخلو أي لقاء اقتصادي او سياسي او اجتماعي من الحديث عن العولمة اذ نشرت العديد من الابحاث والدراسات وعقدت الكثير من الندوات والمؤتمرات لدراسة العولمة وبيان اثارها ولعل ذل
... Show More