In this research we prepared nanofibers by electrospinning
from poly (Vinyl Alcohol) / TiO2. The spectrum of the solution
(Emission) was studied at 772 nm. Several process parameter were
Investigated as concentration of PVA, the effect of distance from
nozzle tip to the grounded collector (gap distance), and final the
effect of high voltage. We find the optimum condition to prepare a
narrow nanofibers is at concentration of PVA 16gm, the fiber has
20nm diameter
The one-dimensional, spherical coordinate, non-linear partial differential equation of transient heat conduction through a hollow spherical thermal insulation material of a thermal conductivity temperature dependent property proposed by an available empirical function is solved analytically using Kirchhoff’s transformation. It is assumed that this insulating material is initially at a uniform temperature. Then, it is suddenly subjected at its inner radius with a step change in temperature. Four thermal insulation materials were selected. An identical analytical solution was achieved when comparing the results of temperature distribution with available analytical solution for the same four case studies that assume a constant thermal con
... Show MoreThe one-dimensional, cylindrical coordinate, non-linear partial differential equation of transient heat conduction through a hollow cylindrical thermal insulation material of a thermal conductivity temperature dependent property proposed by an available empirical
function is solved analytically using Kirchhoff’s transformation. It is assumed that this insulating material is initially at a uniform temperature. Then, it is suddenly subjected at its inner radius with a step change in temperature. Four thermal insulation materials were selected. An identical analytical solution was achieved when comparing the results of temperature distribution with available analytical solution for the same four case studies that assume a constant the
In the last few years, the literature conferred a great interest in studying the feasibility of using memristive devices for computing. Memristive devices are important in structure, dynamics, as well as functionalities of artificial neural networks (ANNs) because of their resemblance to biological learning in synapses and neurons regarding switching characteristics of their resistance. Memristive architecture consists of a number of metastable switches (MSSs). Although the literature covered a variety of memristive applications for general purpose computations, the effect of low or high conductance of each MSS was unclear. This paper focuses on finding a potential criterion to calculate the conductance of each MMS rather t
... Show MoreThe most significant function in oil exploration is determining the reservoir facies, which are based mostly on the primary features of rocks. Porosity, water saturation, and shale volume as well as sonic log and Bulk density are the types of input data utilized in Interactive Petrophysics software to compute rock facies. These data are used to create 15 clusters and four groups of rock facies. Furthermore, the accurate matching between core and well-log data is established by the neural network technique. In the current study, to evaluate the applicability of the cluster analysis approach, the result of rock facies from 29 wells derived from cluster analysis were utilized to redistribute the petrophysical properties for six units of Mishri
... Show MoreThe purified prepared compounds were identified through different methods of identification i.e, I.R, UV-vi^ble-spectroscopy in addition to (coloured tests) Calculation of the sum of OH groups. TLC techniques were also used to test the purity and the speed ofthe rate of flow (RF).
Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More