Ag2S/ZnO Nanorods Composite Photoelectrode Prepared by Hydrothermal Method: Influence of Growth Temperature
...Show More Authors
In this study, the mechanical properties of an epoxy and unidirectional woven carbon with fiberglass composite were experimentally investigated. When preparing the composite samples, American Society for Testing and Materials (ASTM)standard was used. Tensile, impact and flexural test were conducted to investigate the mechanical properties of the new produced epoxy Unidirectional Woven Carbon and Epoxy Fiberglass composites. The outcome showed that the strength of the produced samples increased with the increase in the number of unidirectional woven carbon layers added. Two methods were utilized: (1) woven carbon composite with glass fiber (2) woven carbon composite). The two methods of composite were compared with each other. The resul
... Show MoreGenerally, statistical methods are used in various fields of science, especially in the research field, in which Statistical analysis is carried out by adopting several techniques, according to the nature of the study and its objectives. One of these techniques is building statistical models, which is done through regression models. This technique is considered one of the most important statistical methods for studying the relationship between a dependent variable, also called (the response variable) and the other variables, called covariate variables. This research describes the estimation of the partial linear regression model, as well as the estimation of the “missing at random” values (MAR). Regarding the
... Show MoreAbstract:
This study deals with the influence of the industrial buyer behavior in Channels of distribution. It concentrates on one section of management levels in the company. Which is that of administrative managers The research problem is attempt to study and analysis the influence of industrial buyer behavior in channels of distribution.. The aiming at achieving a number of applicable goals depending on one major hypotheses I set a questionnaire in collecting the data and information relating to the study، which was distributed to sample of ( 30) department manager heads of section states company . In order to process the data resorted to many statistical methods such as arithmetic means the sta
... Show MoreSoil stabilization with liquid asphalt is considered as a sustainable step towards roadway construction on problematic subgrade soil, there are no requirements to import good quality materials or to implement energy consumption, but to mix the readily available soil with liquid asphalt through the cold mix technique. In this work, collapsible soil obtained from Nasiriya was mixed with asphalt emulsion, lime, and combinations of lime and asphalt emulsion (combined stabilization) and tested in the laboratory for California bearing ratio in dry and soaked conditions. Field trial sections have been prepared with the same combinations and subjected to plate bearing test. The influence of combined stabilization on the structural properties in ter
... Show MoreIn this experimental study, the use of stone powder as a stabilizer to the clayey soil studied. Tests of Atterberg limits, compaction, fall cone (FCT), Laboratory vane shear (LVT), and expansion index (EI) were carried out on soil-stone powder mixtures with fixed ratios of stone powder (0%, 5%, 10%, 15%, and 20%) by the dry weight. Results indicated that the undrained shear strength obtained from FCT and LVT increased at all the admixture ratios, and the expansion index reduced with the increase of the stone powder.
The subject of the research seeks to indicate the level of influence of emotional intelligence in the empowerment of workers in the Ministry of Industry and Minerals General Company for Food Products. The research problem is illustrated by knowing all of the following:
Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.