Iron oxide(Fe3O4) nanoparticles of different sizes and shapes were synthesized by solve-hydrothermal reaction assisted by microwave irradiation using ferrous ammonium sulfate as a metal precursor, oleic acid as dispersing agent, ethanol as reducing agent and NaOH as precipitating agent at pH=12. The synthesized Fe3O4 nano particles were characterized by X-ray diffraction (XRD), FTIR and thermal analysis TG-DTG. Sizes and shapes of Fe3O4 nanoparticles were characterized by Scanning Electron Microscopy (SEM), and atomic force microscopy (AFM).
This research is devoted to investigate relationship between both Ultrasonic Pulse Velocity and Rebound Number (Hammer Test) with cube compressive strength and also to study the effect of steel reinforcement on these relationships.
A study was carried out on 32 scale model reinforced concrete elements. Non destructive testing campaign (mainly ultrasonic and rebound hammer tests) made on the same elements. About 72 concrete cubes (15 X 15 X15) were taken from the concrete mixes to check the compressive strength.. Data analyzed.Include the possible correlations between non destructive testing (NDT) and compressive strength (DT) Statistical approach is used for this purpose. A new relationships obtained from correlations results is give
The reducing of erosion and the solubility of irrigation canals soils which constructed on gypsum soil is important in civil and water resources engineering. The main problem of gypsum soils is the presence of gypsum which represents one of most complex engineering problems, especially when accompanied by the moving of water which represent dynamic load along the canal. There are several solutions to this problem, in this research “Poly urethane” is used to give the gypsum soil sufficient hardness to reduce the solubility and erosion, after compacting the soil in the canal, percentages of Poly urethane was used to making cover to the soil by mixing percent of soil with Poly urethane, and the ratio was as follows: (5 and 10) % an
... Show MoreIn this study, the results of x-ray diffraction methods were used to determine the Crystallite size and Lattice strain of Cu2O nanoparticles then to compare the results obtained by using variance analysis method, Scherrer method and Williamson-Hall method. The results of these methods of the same powder which is cuprous oxide, using equations during the determination the crystallite size and lattice strain, It was found that the results obtained the values of the crystallite size (28.302nm) and the lattice strain (0.03541) of the variance analysis method respectively and for the Williamson-Hall method were the results of the crystallite size (21.678nm) and lattice strain (0.00317) respectively, and Scherrer method which gives the value of c
... Show Morethin films of se:2.5% as were deposited on a glass substates by thermal coevaporation techniqi=ue under high vacuum at different thikness
In this effort, we define a new class of fractional analytic functions containing functional parameters in the open unit disk. By employing this class, we introduce two types of fractional operators, differential and integral. The fractional differential operator is considered to be in the sense of Ruscheweyh differential operator, while the fractional integral operator is in the sense of Noor integral. The boundedness and compactness in a complex Banach space are discussed. Other studies are illustrated in the sequel.
This research seeks to unravel the components of the argumentative discourse in the Book ofʻRawdat al-MuhebbeenwaNozhatt al-Mushtaqeenʼ - The Garden of Lovers and the Promenade of Longing People – by Ibn Al-Qayyem Al-Jawziyah. This is because this book has a moderate discourse with a sound Islamic thought that is characterized by its sustainability, popularity, realism, and interaction with the successive developments of the new age. This reflects the intellectual maturity the composing process has reached in the philosophy of love and its educational bases in every place and time. To explore the componets, properties, and the working mechanisms of an argumentative discourse in Ibn Qayyem’s book, the present work has been conducted
... Show MoreGranular Pile Anchor (GPA) is one of the innovative foundation techniques, devised for mitigating heave of footing resulting from the expansive soils. This research attempts to study the heave behavior of (GPA-Foundation System) in expansive soil. Laboratory tests have been conducted on an experimental model in addition to a series of numerical modeling and analysis using the finite element package PLAXIS software. The effects of different parameters, such as (GPA) length (L) and diameter (D), footing diameter (B), expansive clay layer thickness (H) and presence of non-expansive clay are studied. The results proved the efficiency of (GPA) in reducing the heave of exp
... Show MorePraise be to God, Lord of the worlds, and peace and blessings be upon our master Muhammad and his family and companions as follows:
For God Almighty has swapped for every age a group of religious scholars who give news to the narrators, so that they can lie against the Sunnah of the Mustafa, who is among those who memorized Ibn Al-Mulqin, as he followed the ruler in his book Al-Badr Al-Munir in the Hadith of Al-Sharh Al-Kabeer, and our research included two topics, which we explained in the first topic: The sequels in which the teacher's son Al-Malqin disagreed, and we discussed in the second topic: the followings in which Ibn Al-Malqin agreed to rule.
This research included important results, th
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show More