The polymers modified Poly(vinyl chloride) differ in their tendency to photo oxidation comparing with that unmodified. It has been studied Photostability for modified Poly(vinyl chloride) chains using Schiff’s bases derivative of (5-amino-1, 3, 4-thiadiazole-2-thiol) in a manner casting of plastic chips with thickness (40) in a solvent Tetrahydrofuran. It has been determined the effectiveness Photostability of these modified polymers through the photo degradation rate constant for photostabilizer (kd) for the modified Poly (vinyl chloride). Attributed efficiency of these Poly(vinyl chloride) chips in Photostability by replace the atom Cl Poly(vinyl chloride) chains ends more stable than light stabilizer.
This paper develops a fuzzy multi-objective model for solving aggregate production planning problems that contain multiple products and multiple periods in uncertain environments. We seek to minimize total production cost and total labor cost. We adopted a new method that utilizes a Zimmermans approach to determine the tolerance and aspiration levels. The actual performance of an industrial company was used to prove the feasibility of the proposed model. The proposed model shows that the method is useful, generalizable, and can be applied to APP problems with other parameters.
To enhance interfacial bonding between carbon fibers and epoxy matrix, the carbon fibers have been modified with multiwall carbon nanotubes (MWCNTs) using the dip- coating technique. FT-IR spectrum of the MWCNTs shows a peak at 1640 cm−1 corresponding to the stretching mode of the C=C double bond which forms the framework of the carbon nanotube sidewall. The broad peak at 3430 cm−1 is due to O–H stretching vibration of hydroxyl groups and the peak at 1712 cm−1 corresponds to the carboxylic (C=O) group attached to the carbon fiber. The peaks at 2927 cm−1 and 2862 cm−1 ar
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreAt the temperature 298.15 K, some physical properties such as: refractive indices (nD), viscosities (η) and densities (ρ) were studied in four liquid-liquid mixtures: carboxylic acids (HCOOH, CH3COOH, CH3CH2COOH and CH3CH2CH2COOH) with tetrahydrofurfuryl alcohol (THFA) with the identified configuration set. These empirical data were utilized to estimate the excess molar volumes (Vm E), refractive index perversions (ΔR), viscosity deviations (ηE) and excess molar Gibbs free energy (ΔG*E). Values of Vm E, ηE , ΔG*E and ΔR were plotted versus mole fraction of tetrahydrofurfuryl alcohol. In all cases, the values of Vm E, ηE , ΔG*E and ΔR that obtained in this study were found to be negative at 298.15 K. The excess parameters
... Show MoreIn this work, excess properties (eg excess molar volume (VE), excess viscosity (ȠE), excess Gibbs free energy of activation of viscos flow (ΔG* E) and molar refraction changes (ΔnD) of binary solvent mixtures of tetrahydrofurfuryl alcohol (THFA) with aromatic hydrocarbons (benzene, toluene and p-xylene) have been calculated. This was achieved by determining the physical properties including density ρ, viscosity Ƞ and refraction index nD of liquid mixtures at 298.15 K. Results of the excess parameters and deviation functions for the binary solvent mixtures at 298.15 K have been discussed by molecular interactions that occur in these mixtures. Generally, parameters showed negative values and have been found to fit well to Redlich-Kister
... Show MoreEnergy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit
... Show More