To obtain the approximate solution to Riccati matrix differential equations, a new variational iteration approach was proposed, which is suggested to improve the accuracy and increase the convergence rate of the approximate solutons to the exact solution. This technique was found to give very accurate results in a few number of iterations. In this paper, the modified approaches were derived to give modified solutions of proposed and used and the convergence analysis to the exact solution of the derived sequence of approximate solutions is also stated and proved. Two examples were also solved, which shows the reliability and applicability of the proposed approach.
Biodiesel as an attractive energy source; a low-cost and green synthesis technique was utilized for biodiesel preparation via waste cooking oil methanolysis using waste snail shell derived catalyst. The present work aimed to investigate the production of biodiesel fuel from waste materials. The catalyst was greenly synthesized from waste snail shells throughout a calcination process at different calcination time of 2–4 h and temperature of 750–950 ◦C. The catalyst samples were characterized using X-Ray Diffraction (XRD), Brunauer-Emmett-Teller (BET), Energy Dispersive X-ray (EDX), and Fourier Transform Infrared (FT-IR). The reaction variables varying in the range of 10:1–30:1 M ratio of MeOH: oil, 3–11 wt% catalyst loading, 50–
... Show MorePorous materials play an important role in creating a sustainable environment by improving wastewater treatment's efficacy. Porous materials, including adsorbents or ion exchangers, catalysts, metal–organic frameworks, composites, carbon materials, and membranes, have widespread applications in treating wastewater and air pollution. This review examines recent developments in porous materials, focusing on their effectiveness for different wastewater pollutants. Specifically, they can treat a wide range of water contaminants, and many remove over 95% of targeted contaminants. Recent advancements include a wider range of adsorption options, heterogeneous catalysis, a new UV/H2O
With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreThe need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At th
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreThis article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst
... Show MoreThe electrocoagulation process became one of the most important technologies used for water treatment processes in the last few years. It’s the preferred method to remove suspended solids and heavy metals from water for treating drinking water and wastewater from textile, diary, and electroplating factories. This research aims to study the effect of using the electrocoagulation process with aluminum electrodes on the removal efficiency of suspended solids and turbidity presented in raw water and optimizing by the response surface methodology (RSM). The most important variables studied in this research included electrode spacing, the applied voltage, and the operating time of the electrocoagulation process. The samples
... Show MoreNumeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a
... Show More