In this study, experimental and numerical applied of heat distribution due to pulsed Nd: YAG laser surface melting. Experimental side was consists of laser parameters are, pulse duration1.3
This research focuses on improvement of the corrosion behaviour of commercial pure titanium (Ti) grade II when exposed to Hank’s solution through different surface treatments. The disc shape of titanium samples were constructed to be divided according to their surface treatment. The first experimental group the Ti sample was exposed to computer numerical control (CNC) fiber laser machine. Whereas, the other experimental group the Ti sample was only coated with Polyetherketon keton (PEKK) by using carbon dioxide (CO2) laser technique while the last experimental group the Ti sample was treated with CNC fiber laser followed by PEKK coating by using CO2 laser technique. All were compared with the untreated control group. The electrochemical a
... Show MoreA lotic ecosystem is considered a source of carbon dioxide (CO2) in the atmosphere where it becomes supersaturated with CO2, which contributes to the global carbon cycle. To enhance our comprehension of the roles of CO2 in rivers, an outdoor experiment was designed with controlled carbon source inputs to investigate the roles of the dissolved organic carbon (DOC) and dissolved inorganic carbon (DIC) in the phytoplankton community. Plastic enclosures were installed in the Tigris River within Baghdad for that goal. Samples were collected on the first day, as well as on the 5th and the 12th days from 14 enclosures. The enclosures were treated by artificial glucose (C6H12O6) (10, 20, 30mg/ l) as DOC sources, while sodium bicarbonate (NaHCO3) (1
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreIn this study, stabilization of expansive soils using waste materials namely; Cement Kiln Dust (CKD), and waste plastic bottles (WPB) was experimentally investigated. Using CKD and WPB are exponentially increasing day by day, due to their capability to solve both environmental and geotechnical problems successfully. Expansive soils were collected from locations with a wide range of plasticity index (PI) (15 - 27) and liquid limit (LL) (35% - 64%). Stabilizer percentages were varied from 0% to 20%, and curing durations for CKD cases were 7 and 28 days. Results showed the best percentages of CKD and WPB are 12% of each one respectively. LL, plastic limit (PL), and swelling percent (SP) loss were observed, which are 46%, 55%, and 96% respec
... Show MoreIn this paper, the solar surface magnetic flux transport has been simulated by solving the diffusion–advection equation utilizing numerical explicit and implicit methods in 2Dsurface. The simulation was used to study the effect of bipolar tilted angle on the solar flux distribution with time. The results show that the tilted angle controls the magnetic distribution location on the sun’s surface, especially if we know that the sun’s surface velocity distribution is a dependent location. Therefore, the tilted angle parameter has distribution influence.
This paper deals with the ideological positioning of the English poet John Donne in a selected poems of his i.e Holy Sonnet X, as regards the theme of death found therein. The researchers adopt an emerging branch of stylistics, called Critical Stylistics, as proposed by Jeffries (2010) in order to uncover the ideologies of the author regarding the topic concerned and how linguistic choices are used to slant ideas. The model is comprised of ten tools of analysis which, upon being applied to the selected data, have shown how the poet exploits language resources in order to pass his ideology and influence his readers. In this paper, the workings of only one tool are presented as applied to a certain portion of the data.
In this study, Cr−Mo−N thin films with different Mo contents were synthesised via closed field unbalanced magnetron sputtering ion plating. The effects of Mo content on the microstructure, chemical bonding state, and optical properties of the prepared films were investigated by X-ray diffraction spectroscopy (XRD), X-ray photoelectron spectroscopy (XPS), field emission scanning electron microscopy, and ultraviolet-visible spectrophotometry. XRD results determined the face centered cubic (fcc) structure of pure CrN film. The incorporation of molybdenum (Mo) in the CrN matrix was confirmed by both XRD and XPS analyses. The CrMoN coatings demonstrate various polycrystalline phases including CrN, γ-Mo2N, Cr with oxides layers of MoO3, CrO3
... Show MoreIn this work a study was made in centrifugal fan blower to investigate the effect of impeller blade design on sound pressure level (SPL). Shroud and unshroud impeller of nine blades are used. The sound generation from flow inside the test rig at different positions was displayed by using spectral analyzer. The experiments were carried out in anechoic chamber with small holes in its walls, under ambient condition about (25-27) C ° to avoid the effect of temperature on the sound pressure level. The results showed that (SPL) decreased with the increase of distance from the source about (3-4)dB when distance varied about (0.8-1.06)m, and the (SPL) decreased with the decrease of velocity about (8-12)dB when velocity varied between (13000-260
... Show More