A particulate polymer composite material was prepared by reinforcing with the Aluminum Oxide (Al2O3) or Aluminum (Al) metallic particles with a particle size of (30) µm to an unsaturated Polyester Resin with a weight fraction of (5%, 10%, 15%, 20%).
Tensile test results showed the maximum value of elastic modulus reached (2400MPa.) in the case of reinforcing with (Al) particles with weight fraction (20%) and (1500 MPa.) in the case of reinforcing with (Al2O3) particles of the same weight fraction.
When the impact and the flexural strength tests were done, the results showed that flexural strength (F.S), maximum shear stress (τmax), impact strength
... Show MoreIn the present study a new synthesis method has been introduced for the decoration of platinum(Pt) on the functionalized graphene nanoplatelet (GNP) and also highlighted the preparation method of nanofluids. GNP–Pt uniform nanocomposite was produced from a simple chemical reaction procedure, which included acid treatment for functionalization of GNP. The surface characterization was performed by various techniques such as XRD, FESEMand TEM. The effective thermal conductivity, density, viscosity, specific heat capacity and stability of functionalized GNP–Pt water based nanofluids were investigated in different instruments. The GNP–Pt hybrid nanofluids were prepared by dispersing the nanocomposite in base fluid without adding any surfac
... Show MoreThe hydatid materials were collected and studied, so they were contained 50 fertile human hydatid cases {33 (66%) females and 17 (34%) males}. They were collected from Al-Ramadi General Hospital during the period from December, 2003 to July, 2004 .Cysts were observed in 40 (80%) from the liver, 5 (10%) from the lungs, 3 (6%) from the kidney and 2 (4%) cysts from urinary bladder. The specimens were taken from patients of different ages. The in vitro viability of protoscoleces was assessed on the basis of flame cell activity and eosein exclusion, which were considered as criteria to determine the death or viability of protoscoleces. In addition to this movement (flame cell activity), another motility like constriction – relaxatio
... Show MoreIn this work, study the optical properties of composites consisting of poly Methyl Methacrylate and Berry Paper Mulberry. The samples of composites were prepared using casting method .The Berry Paper Mulberry (BPM) was added by different concentrations are (0, 2, 4 and 6)wt.%. The optical properties of composites have been studied in the wavelength range (200-800)nm. The absorption coefficient ,energy gap, refractive index, extinction coefficient and dielectric constants have been determined. The results show that the optical constants change with increase of BPM concentrations .
The effect of D phase polyamide (PA6)on the rheological properties, Young Modulus and the thermal expansion coefficient of two blends groups (bitumen-polyamide) were tested. The first group was for bitumen-PA6 blends and the second group for bitumen blended with polymer resulted from the crystallization of PA6-formic acid solution in water(PAFW).The obtained results proved that adding both types of polyamide has led to a rise in toughness and softening point temperature while the penetration Index approached -3 after adding the polyamide. So, all these changes make bitumen-polyamide blends more suitable for use in hot climate regions. The blends properties were explained according to the reaction that takes place between the polyamide and
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative
... Show MoreThe choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show More