This research studies the development and synthesis of blended nanocomposites filled with Titanium dioxide (TiO2). Blended nanocomposites based on unsaturated polyester resin (UPR) and epoxy resins were synthesized by reactive blending. The optimum quantity from nano partical of titanium dioxide was selected and different weight proportions 1%, 3%, 5%, and 7% ratios of new epoxy are blended with UPR resin. The dielectric breakdown strength and thermal conductivity properties of the blended nanocomposites were compared with those of the basis material (UPR and 3% TiO2).The results show good compatibility epoxy resins with the UPR resin on blending, dielectric breakdown strength values are higher while thermal conductivity values of
... Show MoreAzo-Schiff base compounds (L1 and L2) have been synthesized from the reaction of m-hydroxy benzoic acid with 1,5-dimethyl-3-[2-(5-methyl-1H-indol-3-yl)-ethylimino]-2-phenyl-2,3- dihydro-1H-pyrazol-4-ylamine and with 3-[2-(1H-indol-3-yl)-ethylimino]-1,5-dimethyl-2-phenyl- 2,3-dihydro-1H-pyrazol-4-ylamine. The free ligands and their complexes were characterized based on elemental analysis, determination of metal, molar conductivity, (1H, 13C) NMR, UV–vis, FT-IR, mass spectra and thermal analysis (TGA). The molar conductance data revealed that all the complexes are non-electrolytes. The study of complex formation via molar ratio in DMF solution has been investigated and results were consistent to those found in the solid complexes with a rat
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThe research deals with the analysis of the city's commercial center using geographic information systems to solve the problem of congestion by evaluating the efficiency and adequacy of car parking lots according to local and Arab standards. Undoubtedly, the importance of car parking areas, as they are not within the desired efficiency within the city, will lead to congestion and traffic becomes very difficult. Thus, the transportation service loses its most important characteristic, which is the ease of movement. Therefore, there has become an urgent need to study and analyze it, as well as to verify the adequacy of the service, and the amount of deficit required to be provided to solve the tra
... Show MoreThe purpose of this research is to design a list of the scientific and moral values that should be found in the content of the computer textbook for the second intermediate grade, as well as to analyze the content of the above- mentioned book by answering the following question:
What is the percentage of availability of scientific and moral values in the content of the computer textbook for Second Intermediate grade issued by the Iraqi Ministry of Education / the general directorate of the curriculum, for the academic year (2017-2018)?
In order to achieve the research objectives, the descriptive method (content analysis method) was adopted. The research community has been iden
... Show MoreIn this paper, wavelets were used to study the multivariate fractional Brownian motion through the deviations of the random process to find an efficient estimation of Hurst exponent. The results of simulations experiments were shown that the performance of the proposed estimator was efficient. The estimation process was made by taking advantage of the detail coefficients stationarity from the wavelet transform, as the variance of this coefficient showed the power-low behavior. We use two wavelet filters (Haar and db5) to manage minimizing the mean square error of the model.
In general, path-planning problem is one of most important task in the field of robotics. This paper describes the path-planning problem of mobile robot based on various metaheuristic algorithms. The suitable collision free path of a robot must satisfies certain optimization criteria such as feasibility, minimum path length, safety and smoothness and so on. In this research, various three approaches namely, PSO, Firefly and proposed hybrid FFCPSO are applied in static, known environment to solve the global path-planning problem in three cases. The first case used single mobile robot, the second case used three independent mobile robots and the third case applied three follow up mobile robot. Simulation results, whi
... Show More