In this study, a new type of circulating three-phase fluidized bed reactor was conducted by adding a spiral path and was named as spiral three-phase fluidized bed reactor (TPFB-S) to investigate the possibility for removing engine oil (virgin and waste form) from synthetic wastewater by using Ricinus communis (RC) leaves natural and activated by KOH. The biosorption process was conducted by changing particle diameter in the range 150–300 and 300–600 µm, liquid flow rate in the range 2.5–4.5 L/min and gas flow rate in range of 0–1 L/min, while other parameters initial oil emulsion concentration, pH, adsorbent concentration, agitation speed and contact time were kept constant at 2000 mg/L, 2,
importumt educational institution as (kindergartens) need teachers which qualified ownes modalities in their education for children , as Marzanu method in a way of learning and own methods of crisis management, because the teachers that own those styles of learning ginekindergarten children knowledge and the childrenIeaving based on theMeaing and knowledge and integration of their information, And teachers that earn methods of crisis management provide for the children of the kindergarten security within the educational institution which in turn affect the growth and development of the Child and then abilities, health physical, mental, psychological …etc.., The aims of the current research have identified to recognize: 1- the dimension
... Show MoreShumblan (SH) is one of the most undesirable aquatic plants widespread in the irrigation channels and water bodies. This work focuses on boosting the biogas potential of shumblan by co-digesting it with other types of wastes without employing any chemical or thermal pretreatments as done in previous studies. A maximum biogas recovery of 378 ml/g VS was reached using shumblan with cow manure as inoculum in a ratio of 1:1. The methane content of the biogas was 55%. Based on volatile solid (VS) and C/N ratios, biogas productions of 518, 434, and 580 ml/g VS were obtained when the shumblan was co-digested with food wastes (SH:F), paper wastes (SH:P), and green wastes (SH:G) respectively. No significant changes of methane contents were observ
... Show MoreIn this research, the semiparametric Bayesian method is compared with the classical method to estimate reliability function of three systems : k-out of-n system, series system, and parallel system. Each system consists of three components, the first one represents the composite parametric in which failure times distributed as exponential, whereas the second and the third components are nonparametric ones in which reliability estimations depend on Kernel method using two methods to estimate bandwidth parameter h method and Kaplan-Meier method. To indicate a better method for system reliability function estimation, it has be
... Show MoreThe region-based association analysis has been proposed to capture the collective behavior of sets of variants by testing the association of each set instead of individual variants with the disease. Such an analysis typically involves a list of unphased multiple-locus genotypes with potentially sparse frequencies in cases and controls. To tackle the problem of the sparse distribution, a two-stage approach was proposed in literature: In the first stage, haplotypes are computationally inferred from genotypes, followed by a haplotype coclassification. In the second stage, the association analysis is performed on the inferred haplotype groups. If a haplotype is unevenly distributed between the case and control samples, this haplotype is labeled
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show More