In this study, aluminum alloyAA6061-T6 was joined by a hot press process with three types of material; polyamide PA 6.6 (nylon), 1% carbon nanotube/PA6.6 and 30% carbon fiber/PA6.6 composites. Three parameters were considered in the hot pressing; temperature (180, 200 and 220°C), pressure (2, 3, 4, 5 and 6 bar) and time of pressing (1, 2, 3, 4 and 5 minutes for 200ºC, and 0.25, 0.5, 0.75, 1 and 1.25 minutes for220ºC). Applied pressure has great effect on shear strength of the joint, corresponding to bonding time and temperature. Maximum shear strength was 8.89MPa obtained for PA6.6 at bonding conditions of 4 bar, 220ºC and 0.75 minute. For 30% carbon fiber/PA6,6 shear recorded was 8MPa at 4 bar, 220°C and 1 minute, while 1% carbon nanotube/PA6.6 was registered at 8MPa at 4 bar, 220ºC and 0.75 minute. Mechanical interlocking of polyimide in anodizing surface is 8μm approximately. The melting point and glass transmission temperature of polyimide and composites are decreased after hot pressing.
The Harmonic Oscillator (HO) and Gaussian (GS) wave functions within the Binary Cluster Model (BCM) were employed to investigate neutron, proton and matter densities of the ground state as well as the elastic proton form factors of one neutron 8Li and 22N halo nuclei. The long tail is a property that is clearly shown in the neutron density. The existence of a long tail in the neutron densities of 8Li and 22N indicates that these nuclei have a neutron halo structure. Moreover, the matter rms radii and the reaction cross section of these nuclei were calculated using the Glauber model.
The last two decades have seen a marked increase in the illegal activities on the Dark Web. Prompt evolvement and use of sophisticated protocols make it difficult for security agencies to identify and investigate these activities by conventional methods. Moreover, tracing criminals and terrorists poses a great challenge keeping in mind that cybercrimes are no less serious than real life crimes. At the same time, computer security societies and law enforcement pay a great deal of attention on detecting and monitoring illegal sites on the Dark Web. Retrieval of relevant information is not an easy task because of vastness and ever-changing nature of the Dark Web; as a result, web crawlers play a vital role in achieving this task. The
... Show MoreTo maintain a sustained competitive position in the contemporary environment of knowledge economy, organizations as an open social systems must have an ability to learn and know how to adapt to rapid changes in a proper fashion so that organizational objectives will be achieved efficiently and effectively. A multilevel approach is adopted proposing that organizational learning suffers from the lack of interest about the strategic competitive performance of the organization. This remains implicit almost in all models of organizational learning and there is little focus on how learning organizations achieve sustainable competitive advantage . A dynamic model that captures t
... Show MoreThe protection of public money and its surrounding with special provisions that guarantee that protection from every legal or material assault by the supervisory bodies competent to combat corruption are described as a criminal procedural protection aimed at prosecuting criminals in general crimes and government corruption crimes in particular, and working to recover funds and return them to the state treasury, These agencies operate in an integrated format, each other and in a coherent manner with each other, in order to achieve the purpose of their establishment and reach the basic goal, which is to eliminate corruption from the theoretical side Practical reality.
In recent years, with the growing size and the importance of computer networks, it is very necessary to provide adequate protection for users data from snooping through the use of one of the protection techniques: encryption, firewall and intrusion detection systems etc. Intrusion detection systems is considered one of the most important components in the computer networks that deal with Network security problems. In this research, we suggested the intrusion detection and classification system through merging Fuzzy logic and Artificial Bee Colony Algorithm. Fuzzy logic has been used to build a classifier which has the ability to distinguish between the behavior of the normal user and behavior of the intruder. The artificial bee colony al
... Show MoreDue to the importance of solutions of partial differential equations, linear, nonlinear, homogeneous, and non-homogeneous, in important life applications, including engineering applications, physics and astronomy, medical sciences, and life technology, and their importance in solutions to heat transfer equations, wave, Laplace equation, telegraph, etc. In this paper, a new double integral transform has been proposed.
In this work, we have introduced a new double transform ( Double Complex EE Transform ). In addition, we presented the convolution theorem and proved the properties of the proposed transform, which has an effective and useful role in dealing with the solution of two-dimensional partial differential equations. Moreover
... Show MoreThe provision of safe water for people is a human right; historically, a major number of people depend on groundwater as a source of water for their needs, such as agricultural, industrial or human activities. Water resources have recently been affected by organic and/or inorganic contaminants as a result of population growth and increased anthropogenic activity, soil leaching and pollution. Water resource remediation has become a serious environmental concern, since it has a direct impact on many aspects of people’s lives. For decades, the pump-and-treat method has been considered the predominant treatment process for the remediation of contaminated groundwater with organic and inorganic contaminants. On the other side, this tech
... Show MoreSome intestinal parasites might impact a child's nutritional condition and lipid profile. It has recently been revealed that these parasites have a link to biometric data and lipid profiles. As a result, the current study aims to see how Giardia lamblia and Cryptosporidium affect nutritional status and lipid profile. From October 2021 to March 2022, this study was done in Baghdad. The participants in the study were 110 children of both sexes, ranging in age from 2 to 17. According to the results of the stool examination, the children were separated into three groups: those infected with Giardia lamblia (n=47), those infected with Cryptosporidium (n=43), and those who appeared to be healthy (n=
... Show MoreElectrocardiography (ECG or EKG) is the process of recording the electrical activity of the heart over a period of time using electrodes placed on the skin. The main idea is how to detect activity of the heart from skin that appears in video without using electrodes. This paper, proposes an algorithm that works on analyzing video frames to detect heartbeats from tiny changes that happen in a skin color luminance (brightness) and then using them to amplifying heartbeat and drawing ECG. The results show that the heartbeat was detected and amplified and ECG was drawing from any part of the human body in different situations and from different video.