A particulate polymer composite material was prepared by reinforcing with the Aluminum Oxide (Al2O3) or Aluminum (Al) metallic particles with a particle size of (30) µm to an unsaturated Polyester Resin with a weight fraction of (5%, 10%, 15%, 20%).
Tensile test results showed the maximum value of elastic modulus reached (2400MPa.) in the case of reinforcing with (Al) particles with weight fraction (20%) and (1500 MPa.) in the case of reinforcing with (Al2O3) particles of the same weight fraction.
When the impact and the flexural strength tests were done, the results showed that flexural strength (F.S), maximum shear stress (τmax), impact strength
... Show MoreIn this paper, the Reliability Analysis with utilizing a Monte Carlo simulation (MCS) process was conducted on the equation of the collapse potential predicted by ANN to study its reliability when utilized in a situation of soil that has uncertainty in its properties. The prediction equation utilized in this study was developed previously by the authors. The probabilities of failure were then plotted against a range of uncertainties expressed in terms of coefficient of variation. As a result of reliability analysis, it was found that the collapse potential equation showed a high degree of reliability in case of uncertainty in gypseous sandy soil properties within the specified coefficient of variation (COV) for each property. When t
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
There are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja
Audio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some
... Show MoreThe lead has adverse effects in contamination the aquatic environment, for this reason, a laboratory simulation was conducted using kaolinite collected from the Ga’ara Formation at western Iraq to be considered as a natural sorbent material that can be addressed Pb2+ from the aqueous environments. The Energy-Dispersive X-ray Spectroscopy and atomic absorption spectroscopy clarifying very fine grains and pure phase with a very little quantity of quartz and has a number of active sites for adsorption. The sorption of kaolinite for the Pb2+ has been carefully tested by several designed laboratory experiments. Five lead solutions of different concentrations (25, 50, 75, 100 and 125 ppm) were tested under different values of pH (1.3-9)
... Show MoreImage segmentation can be defined as a cutting or segmenting process of the digital image into many useful points which are called segmentation, that includes image elements contribute with certain attributes different form Pixel that constitute other parts. Two phases were followed in image processing by the researcher in this paper. At the beginning, pre-processing image on images was made before the segmentation process through statistical confidence intervals that can be used for estimate of unknown remarks suggested by Acho & Buenestado in 2018. Then, the second phase includes image segmentation process by using "Bernsen's Thresholding Technique" in the first phase. The researcher drew a conclusion that in case of utilizing
... Show More