This research deals with increasing the hardening and insulating the petroleum pipes against the conditions and erosion of different environments. So, basic material of epoxy has been mixed with Ceramic Nano Zirconia reinforcement material 35 nm with the percentages (0,1,2,3,4,5) %, whereas the paint basis of broken petroleum pipes was used to paint on it, then it was cut into dimensions (2 cm. × 2 cm.) and 0.3cm high. After the paint and percentages are completed, the samples were immersed into the paint. Then, the micro-hardness was checked according to Vickers method and thermal inspection of paint, which contained (Thermal conduction, thermal flux and Thermal diffusivity), the density of the painted samples was calculated,. The results of the research indicate that the concentration (5%ZrO2) gives the best results that the hardness of this concentration reached to (92 Hv). By contrast, the thermal conduction was continued at a insulation limit (2.4 W/m.K). The thermal diffusivity was (1.16 mm2/sec.), the thermal flux reached to (70.4 w.s 1/2/m2.K) and the density at the same percentage was (4.87 g/m3). This means that there is a linear proportionality and development with increasing in the percentage of Nano Zirconia additive to epoxy.
Iraq economy suffered, nor , still many difficulties and problems , including oil derivatives crisis that emerged in 2004 and was the most prominent features of the inability of local production to meet the needs of the increasing growth of consumption, the crisis has cast a shadow on the growth of national in general, and citizen living in particular. Therefore, the real test of crisis and challenge to the capacity of government agencies to manage the crisis and control and reduce its harmful effects, which disappear in a region or sector, even begin to appear in another, given the multiplicity and complexity of third-party solution for remedying the negative consequences of deliberate.
A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show MoreDust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system
... Show MoreEmotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show Moreان تصنيع رمال مطلية بأوكسيد الحديد من خلال ترسيب الجزيئات النانوية لذلك الاوكسيد على سطوح الرمال واستخدامها في الحاجز التفاعلي النفاذ لإزالة ايونات الكادميوم والنحاس من المياه الجوفية الملوثة الهدف الرئيسي للدراسة الحالية. تم توصيف بيانات الامتزاز نتيجة تفاعل المادة المازة مع المادة الممتزة قيد الدراسة بشكل جيد من خلال نموذج لانكمير والذي كان أفضل من نموذج فراندلش. لقد وجد ان اعلى قيم لقابلية الامتزاز با
... Show MoreThe research acquires its importance by motivating the behavioural side of the employees to apply modern technology in the work, because of its great importance in increasing the efficiency of employees’ performance and excellence. The research was based on two main hypotheses to show the relationship and impact between the variables through the adoption of a questionnaire to collect data and information related to the research, which consisted of (50) people from administrators working at different levels, based on personal interviews and field visits to collect research data. The data collection process was subjected to statistical analysis using the statistical program (SPSS) (Statistical package for social science) to reach
... Show MoreDuring recent decades, hundreds of thousands of Iraqis lost their lives as a result of wars, economic blockade, or acts of violence and terrorism. The loss of a family member, especially husband makes women suddenly bears full responsibility for the family. Lost could impose new changes in psychological, social, and economical roles. These changes usually combine with the negative effects aftermath the lost trauma. Some of the reports in Iraq showed there were increased and huge numbers of widows and orphans. This study aimed to identify the aspects of Posttraumatic Growth (PTG) in Iraq women who lost their close relatives (especially husbands). 52 of Iraqi women who lost their husband and 49 women who experienced other traumatic events
... Show MoreThis paper reports a.c., d.c. conductivity and dielectric behavior of Ep-hybrid composite with12 Vol.% Kevlar-Carbon hybrid . D.C. conductivity measurements are conducted on the graded composites by using an electrometer over the temperature range from (293-413) K. It was shown then that conductivity increases by increasing number of Kevlar –Carbon fiber layers (Ep1, Ep2, Ep3), due to the high electrical conductivity of Carbon fiber. To identify the mechanism governing the conduction, the activation energies at low temperature region (LTR) and at high temperature region (HTR) have been calculated. The activation energy values for hybrid composite decrease with increasing number of fiber layers. The a.c. conductivity was measured over fr
... Show MoreThis study aims to study some morphological and reproductional characteristics in eleven species of two genera belonging to the family of Asparagaceae, which are Bellevalia Lapeyrouse, 1808 and Ornithogalum Linnaeus, 1753 and the species are: Bellevalia chrisii Yildirim and Sahin, 2014; Bellevalia flexuosa Boissier, 1854; Bellevalia kurdistanica Feinbrun, 1940; Bellevalia longipes Post, 1895; Bellevalia macrobotrys Boissier, 1853; Bellevalia paradoxa Boissier, 1882; Bellevalia parva Wendelbo, 1973; Bellevalia saviczii Woronow, 1927; Ornithogalum brachystachys C. Koch, 1849; Ornithogalum neurostegium Boissier, 1882 and Ornithogalum pyrenaicum Linnaeus, 1753. These species were identified and compared with each other; the results showed th
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More