الهدف من الدراسه تحضير فئه جديده من بوليمرات السليكون P1-P4 والتي تمت على اساس استحدام ثنائي مثيل ثنائي كلورو سيلان((DCDMS مع بعض المركبات العضويه التي تحتوي مجاميع الهيدروكسيل الطرفيه والتي حضرت لاول مره M1-M4، بأستخدم البلمره التكثيفيه .كما تم تحضير متراكباتها النانويهP′1-P′4 بوجود جسيمات الفضه النانويه (Ag-NPs) باستخدام طريقة صب المحاليل. شخصت جميع التراكيب للمونمرات والبوليمرات المحضره باستخدام مطيافية FTIR و H1NMR (لبعض البوليمرات) مما سمح بتحديد المجموعات الوظيفية الفعاله للمونومرات وبوليمرات السيليكون. اجريت التحاليل الحراريه الوزنيه TGAوالمسح المسعري التفاضلي DSC لتقييم السلوك الحراري وتاثير وجود جسيمات الفضه النانويهAgNPs .اظهرت نتائج التحليل الحراري ان وجود حلقات الفنيل اظهرت استقرارحراري لبوليمرات السيليكون النقية P1-P4 وان اقحام جسيمات الفضه النانويه بوزن 7 ٪ اظهرت تحسن في الاداء الحراري للمتراكبات النانويه P′1-P′4 مقارنة ببوليمرات السليكون النقيه، ممايعني ان درجة الحراره لفقدان الوزن TGA كانت اعلى لمعظم المتراكبات النانويه P′1-P′4 مقارنة الى بوليمرات السليكون النقيه ، حيث ازدادت درجة الحراره لفقدان الوزن TGA للبوليمر P2 من 127 الى 196 للمتراكبه التانويه P′2 ،وهذا قد بعود الى ملئ الفراغات الحره بين السلاسل البوليمريه بواسطة جسيمات الفضه النانويه .استخدمت تقنية حيود الاشعه السينيه XRD لتشخيص وجود جسيمات الفضة النانويه حيث اظهرت XRD وجود الفضه بحجم نانوي يتراوح بين 20-30 نانوميتر بالاضافه الى دراسة شكل وحجم جسيمات الفضه يتقنية مجهر القوة الذريه وكما تم دراسة مورفولجية السطح باستخدام تقنية مجهر المسح الالكتروني والذي اظهرنوعا ما سطح موحد للمتراكبه النانويه.
Purpose: The diagnosis and determine the level of balance between the time available for life and work with the doctors in the hospitals of t the six hospitals in the City of Medicine.
Design / methodology / Approach: It has been relying on ready-scale, to make sure the diagnosis and determine the level of balance between the time available for life and work, where they were distributed on Form 42 doctors in the six hospitals in the City of Medicine, were analyzed by software (Nvivo and SPSS v.22).
Results: The results showed that there is a good level of balance between the time available for life and work with the doctors.
Research limitations: The diffi
... Show MoreThe Rwandan author of comfort chests and verse pleasure of the most important historians of the Seljuks in the sixth century AH / twelfth century and belongs to the mostly ethnic scientists family has won favor with the Sultans of the Seljuks until he became the most famous Markhém is his main source of research sources with respect to the political and social history the Seljuks and the relationship of the Seljuk sultans of the Abbasid caliphs in Baghdad.
The book included the history of the Seljuks from the time of statehood in the fifth century AH / atheist century AD until the death of the Sultan Tgrl bin Arslan year 590 AH / 1193 AD and then shed Akhawarzmeyen, and touched the author at the end of the book in separate chapters t
Rwanga (view) movement is a new Kurdish poetry movement. Some poets and modern storywriters published a manifest in 1970. They have made a group of changes in the content and appearance of Kurdish poetry. They were under the influence of western literature schools such as Surrealism, Dadaism and Existentialism. Likewise, the impact of the new Arabic literature that appeared by the end of 1960s on them was obvious as they were imitating such literatures. Nevertheless, the condition of Kurdistan at that time was in need of a new literature to express that new stage. Sherko Bekas was one of those poets who became the dynamo of the poetic movement in which the rebellion spirit was embodied in the modern way of dealing with culture, rhyme, rh
... Show MoreGreen synthesis methods have emerged as favorable techniques for the synthesis of nano-oxides due to their simplicity, cost-effectiveness, eco-friendliness, and non-toxicity. In this study, Nickel oxide nanoparticles (NiO-NPs) were synthesized using the aqueous extract of Laurus nobilis leaves as a natural capping agent. The synthesized NiO-NPs were employed as an adsorbent for the removal of Biebrich Scarlet (BS) dye from aqueous solution using adsorption technique. Comprehensive characterization of NiO-NPs was performed using various techniques such as atomic force microscopy (AFM), Fourier transform infrared (FTIR), X-ray diffraction (XRD), Brunauer-Emmett and Teller (BET) analysis, and scanning electron microscopy (SEM). Additionally, o
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreIn the present work a theoretical analysis depending on the new higher order . element in shear deformation theory for simply supported cross-ply laminated plate is developed. The new displacement field of the middle surface expanded as a combination of exponential and trigonometric function of thickness coordinate with the transverse displacement taken to be constant through the thickness. The governing equations are derived using Hamilton’s principle and solved using Navier solution method to obtain the deflection and stresses under uniform sinusoidal load. The effect of many design parameters such as number of laminates, aspect ratio and thickness ratio on static behavior of the laminated composite plate has been studied. The
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More