Adsorption capacity of a waste biomass, date stones, for phenolic compounds such as phenol (Ph) and p-nitro phenol (PNPh) was investigated. The characteristics of such waste biomass were determined and found to have a surface area and iodine number of 495.71 m²/g and 475.88 mg/g, respectively. The effects of temperature, initial sorbate concentration, and contact time on the adsorption process were studied. Experimental equilibrium data for adsorption of Ph and PNPh on date stones were analyzed by the Langmuir, Freundlich and Sips isotherm models. The results show that the best fit was achieved with the Sips isotherm equation with maximum adsorption capacities of 147.09 and 179.62 mg/g for Ph and PNPh, respectively. The kinetic data were fitted to pseudo-first order, pseudo-second order and intraparticle diffusion models, and was found to follow closely the pseudo-second order model for both Ph and PNPh. The calculated thermodynamic parameters, namely AG, AH, and AS showed that adsorption of Ph and PNPh onto date stones was spontaneous and endothermic under examined conditions.
These years Qatar has emerged as an important regional destination of foreign direct investment (FDI), which demonstrates the recent success of several smaller economies in attracting FDI. This paper aims to investigate the causal relationships between inward FDI and economic growth in the particular case of Qatar featured as oil production country. Vector Autoregressive (VAR) Impulse Responses and Granger Causality Tests were adopted as major research methods. Annual data set was used covering from 1990 to 2010. The main results demonstrated the bi-directional causality and long-run relationships between FDI inflows and economic growth in Qatar. And to attract FDI inflows into Qatar, the government shall continue its efforts in const
... Show MoreThis study aims to demonstrate the role of artificial intelligence and metaverse techniques, mainly logistical Regression, in reducing earnings management in Iraqi private banks. Synthetic intelligence approaches have shown the capability to detect irregularities in financial statements and mitigate the practice of earnings management. In contrast, many privately owned banks in Iraq historically relied on manual processes involving pen and paper for recording and posting financial information in their accounting records. However, the banking sector in Iraq has undergone technological advancements, leading to the Automation of most banking operations. Conventional audit techniques have become outdated due to factors such as the accuracy of d
... Show MoreImage content verification is to confirm the validity of the images, i.e. . To test if the image has experienced any alteration since it was made. Computerized watermarking has turned into a promising procedure for image content verification in light of its exceptional execution and capacity of altering identification.
In this study, a new scheme for image verification reliant on two dimensional chaotic maps and Discrete Wavelet Transform (DWT) is introduced. Arnold transforms is first applied to Host image (H) for scrambling as a pretreatment stage, then the scrambled host image is partitioned into sub-blocks of size 2×2 in which a 2D DWT is utilized on ea
... Show MoreThe aim of this book is to present a method for solving high order ordinary differential equations with two point boundary condition of the different kind, we propose semi-analytic technique using two-point osculatory interpolation to construct polynomial solution. The original problem is concerned using two-points osculatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0 , 1] . Also, we discussion the existence and uniqueness of solutions and many examples are presented to demonstrate the applicability, accuracy and efficiency of the methods by compared with conventional method .i.e. VIDM , Septic B-Spline , , NIM , HPM, Haar wavelets on one hand and to confirm the order convergence on the other
... Show MoreThe type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show MorePurpose: As managers can lead a set of ways to improve internal communication in public organizations, and leadership can cultivate a common understanding of goals within the organization and share the vision in preparation for its way to better performance, the purpose of the research is to assess the type and strength of the relationship between internal communication and different forms of leadership. Theoretical framework: The study demonstrates how leaders in public organizations improve internal communication, related to employees' perceptions of public organizations' routines and performance. Design/methodology/approach: The study uses the ordinary least squares (OLS) and applied multiple regression A sa
... Show MoreThe basic concepts of some near open subgraphs, near rough, near exact and near fuzzy graphs are introduced and sufficiently illustrated. The Gm-closure space induced by closure operators is used to generalize the basic rough graph concepts. We introduce the near exactness and near roughness by applying the near concepts to make more accuracy for definability of graphs. We give a new definition for a membership function to find near interior, near boundary and near exterior vertices. Moreover, proved results, examples and counter examples are provided. The Gm-closure structure which suggested in this paper opens up the way for applying rich amount of topological facts and methods in the process of granular computing.
Abstract-Industrial and urban development has resulted in the spread of plastic waste and the increase in the emissions of carbon dioxide resulting from the cement manufacturing process. The current research aims to produce green (environmentally friendly) concrete by using plastic waste as coarse aggregates in different proportions (10% and 20%) and nano silica sand powder as an alternative to cement in different proportions (5% and 10% by weight). The results showed that compressive strength decreased by 12.10% and 19.23% for 10% and 20% plastic waste replacement and increased by 12.89% and 20.39% for 5% and 10% silica sand replacement respectively at 28 days. Flexural strength decreased by 12.95% and 19.64% for 10% and 20% plastic waste
... Show More