Adsorption capacity of a waste biomass, date stones, for phenolic compounds such as phenol (Ph) and p-nitro phenol (PNPh) was investigated. The characteristics of such waste biomass were determined and found to have a surface area and iodine number of 495.71 m²/g and 475.88 mg/g, respectively. The effects of temperature, initial sorbate concentration, and contact time on the adsorption process were studied. Experimental equilibrium data for adsorption of Ph and PNPh on date stones were analyzed by the Langmuir, Freundlich and Sips isotherm models. The results show that the best fit was achieved with the Sips isotherm equation with maximum adsorption capacities of 147.09 and 179.62 mg/g for Ph and PNPh, respectively. The kinetic data were fitted to pseudo-first order, pseudo-second order and intraparticle diffusion models, and was found to follow closely the pseudo-second order model for both Ph and PNPh. The calculated thermodynamic parameters, namely AG, AH, and AS showed that adsorption of Ph and PNPh onto date stones was spontaneous and endothermic under examined conditions.
The Study aims to show the role of Flexible Budget in planning and control The Factory over head.
The study consists four reaserchs the First introduction for the role of Budget in planning and control The second definition Flexible Badget the Third Factory overhed cost variances Analysis The four conclusions and recommendations.
The factory overhead cost represents great ratio from product cost so the management must planning and control on cost Through the year by the Budget of factory over head in the beginning of the year and determind overhead rater.
The topic of the partnership between the public and private sectors with great interest by researchers around the world after making sure that the process of economic and social development depends on a combination of resources and energies and expertise of both the public and private sectors in the creation and operation of the various projects , the economic development of the growing proved the failure of both sectors in achieving greater economic growth Klaaly separately in many countries , especially developing countries with a socialist approach , led one way or another to adopt most of the countries economic reform programs promoted by international organizations and institutions ( such as the IMF and the World Bank ) of i
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreMany cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm. It is necessary to make this algorithm more efficient and powerful through
... Show MoreIn this paper, we introduce the concept of Jordan –algebra, special Jordan –algebra and triple –homomorphisms. We also introduce Bi - –derivations and Annihilator of Jordan algebra. Finally, we study the triple –homomorphisms and Bi - –derivations on Jordan algebra.
In the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show More