The removal of COD from wastewater generated by petroleum refinery has been investigated by adopting electrocoagulation (EC) combined with adsorption using activated carbon (AC) derived from avocado seeds. The process variables influencing COD removal were studied: current density (2–10 mA/cm2), pH (4–9), and AC dosage (0.2–1 g/L). Response surface methodology (RSM) based on Box–Behnken design (BBD) was used to construct a mathematical model of the EC/AC process. Results showed that current density has the major effect on the COD removal with a percent of contribution 32.78% followed by pH while AC dosage has not a remarkable effect due to the good characteristics of AC derived from avocado seeds. Increasing current density gives be
... Show MoreIn this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm.
The present work describes guggul as a novel carrier for some anti-inflammatory drugs. Guggulusomes containing different concentration of guggul with aceclofenac were prepared by sonication method and characterized for vesicle shape, size, size-distribution, pH, viscosity, spread ability, homogeneity, and accelerated stability in-vitro drug permeation through mouse skin. The vesicles exhibited an entrapment efficiency of 93.2 ± 12%, vesicle size of 0.769 ± 3μm and a zeta potential of - 6.21mV. In vitro drug release was analyzed using Franz’s diffusion cells. The cumulative release of the guggulusomes gel (G2) was 75.8% in 18 hrs, which is greater than that all the gel formulation. The stability profile of prepare
... Show MoreSecured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
The study aims to identify how to build the media message in an artistic design style (infographic) to reach the mechanism of building the media message by infographic in the researched news sites. For the survey method, which is one of the best methods used to study the subject of the research, the researcher used the method of content analysis, the employee of the research tool, a quantitative and qualitative content analysis form for the study of 74 infographics that appeared during the research period in the research sample sites. The study revealed a number of results, most notably 1. The surveyed sites employed the information in a manner based on images, shapes and data, that is, through the use of the visual element and the
... Show MoreCryptography is the technology of protecting information and communication by means of encoding the sending information. Existing methods often operate within predetermined mathematical structures which can be subject to pattern recognition and which are lack biological randomness. To address these challenges, this paper introduced a new bio-inspired cryptography approach to protect text messages using the coding mechanisms of DNA and RNA materials. The encryption system consists of six steps: encoding the plaintext message into DNA sequences, transcribing DNA into RNA, applying the complementary base pairing, scrambling RNA segments, optional reverse transcription, and encoding the resulting DNA-RNA characters into ciphertext. Rand
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThis review examines how artificial intelligence (AI) including machine learning (ML), deep learning (DL), and the Internet of Things (IoT) is transforming operations across exploration, production, and refining in the Middle Eastern oil and gas sector. Using a systematic literature review approach, the study analyzes AI adoption in upstream, midstream, and downstream activities, with a focus on predictive maintenance, emission monitoring, and digital transformation. It identifies both opportunities and challenges in applying AI to achieve environmental and economic goals. Although adoption levels vary across the region, countries such as Saudi Arabia, the UAE, and Qatar are leading initiatives that align with global sustainability targets.
... Show More