Preferred Language
Articles
/
alkej-147
Evaluation Study of Glass Fiber Reinforced Polyester and Kevlar Reinforced Polyester by Taguchi Method
...Show More Authors

     In the present investigation two different types of fiber reinforced polymer composites were prepared by hand lay-up method using three different parameters (curing temperature, pressing load and fiber volume fraction). These composites were prepared from the polyester resin as the matrix material reinforced with glass fibers as first group of samples and mat Kevlar fibers as the second group, both with different volume fractions (4%, 8%, and 12%) of fibers. They were then tested by tensile strength and impact strength. The main objective in this study is to use Taguchi method for predicting the better parameters that give the better tensile and impact strength to the composites, and then preparing composites at these parameters and comparing them with the randomly used once. The experimental and analytical results showed that the Taguchi method was successful in optimizing the parameters that give the highest properties and it can find the most influential parameter regardless of the material used. Also it showed that the volume fraction was the most influential parameter on the tensile and impact strength. The difference between these composites was in the properties values and that the Kevlar composites have higher tensile and impact strength.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Spatial Aesthetics in the Novels (Shai Al-Aroos by Maysaloon Hadi) and (Qiyamat Baghdad by Alya Talib) Balance Technical Study
...Show More Authors

This study aims to create spatial balance between two Iraqi writers' novels (Maysaloon
Hadi, Alya Talib) technical and objective illustrates similarity points and difference in the
writers' style. We depended in our research on spatial classification considering the aggressive
and friendly, since the writers focused on them.
The research study concluded to many sides, some of which are similar and some are
different. Firstly, ingenuity description of the writers. Followed by the deep connection they
have. Because of the personal experience it emanated from alienation sensations and nostalgia
to deep roots to homeland.
On the other hand, difference aspects, we see Maysaloon takes symbols and illusions
unlike Aly

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 24 2025
Journal Name
Al–bahith Al–a'alami
Organizational reputation: A descriptive study of concept development and measurement techniques
...Show More Authors

The study aimed to monitor the concept of reputation in the previous literature, its relationship to mental image and identity, and to reveal recent trends in its measurement Techniques.

    The study relied on a descriptive approach using library survey and comparative analysis, and the study reached following conclusions:

     Despite the beginning of the first signs of reputation In the fifties of the last century, however, Defining and standardizing the concept with clear and specific dimensions began in the 1990s and the beginning of the third millennium. The concept of reputation refers to the stakeholders’ overall evaluation of organizations, which reflects their perceptions of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
Determining situational dimensions as a method of Equivalence in the source and target language in the translation of Russian and Arab: ( Понимание реальности ) средство полной эквивалентности текста оргинала и текста перевода на русском и арабском языках
...Show More Authors

The present paper stresses the direct effect of the situational dimension termed as “reality” on the authors’ thoughts and attitudes. Every text is placed within a particular situation which has to be correctly identified by the translator as the first and the most important step for a good translation. Hence, the content of any word production reflects some part of reality. Comprehending any text includes comprehending the reality’s different dimensions as reflected in the text and, thus illuminating the connection of reality features.

Аннотация 

Исследование под названием  ((«Понимание реальности» средство полно

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A Numerical Study of Concrete Composite Circular Columns encased with GFRP I-Section using the Finite Element Method
...Show More Authors

This paper presents ABAQUS simulations of fully encased composite columns, aiming to examine the behavior of a composite column system under different load conditions, namely concentric, eccentric with 25 mm eccentricity, and flexural loading. The numerical results are validated with the experimental results obtained for columns subjected to static loads. A new loading condition with a 50 mm eccentricity is simulated to obtain additional data points for constructing the interaction diagram of load-moment curves, in an attempt to investigate the load-moment behavior for a reference column with a steel I-section and a column with a GFRP I-section. The result comparison shows that the experimental data align closely with the simulation

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 07 2024
Journal Name
Heliyon
Micro-shear bond strength of a novel resin-modified glass ionomer luting cement (eRMGIC) functionalized with organophosphorus monomer to different dental substrates
...Show More Authors

Objectives: This study aims to assess and compare the micro-shear bond strength (μSBS) of a novel resin-modified glass-ionomer luting cement functionalized with a methacrylate co-monomer containing a phosphoric acid group, 30 wt% 2-(methacryloxy) ethyl phosphate (2-MEP), with different substrates (dentin, enamel, zirconia, and base metal alloy). This assessment is conducted in comparison with conventional resin-modified glass ionomer cement and self-adhesive resin cement. Materials and methods: In this in vitro study, ninety-six specimens were prepared and categorized into four groups: enamel (A), dentin (B), zirconia (C), and base metal alloys (D). Enamel (E) and dentin (D) specimens were obtained from 30 human maxillary first premolars e

... Show More
Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison between robust methods in canonical correlation by using empirical influence function
...Show More Authors

       Canonical correlation analysis is one of the common methods for analyzing data and know the relationship between two sets of variables under study, as it depends on the process of analyzing the variance matrix or the correlation matrix. Researchers resort to the use of many methods to estimate canonical correlation (CC); some are biased for outliers, and others are resistant to those values; in addition, there are standards that check the efficiency of estimation methods.

In our research, we dealt with robust estimation methods that depend on the correlation matrix in the analysis process to obtain a robust canonical correlation coefficient, which is the method of Biwe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of Integrated Information Technology System in Organizations “Exploratory Comparative Search for opinions of sample of Workers in the Faculties of Science & Education AL- Asma'I at the University of Diyala
...Show More Authors

       The subject of the information technology system ( ITS ) of the important issues And contemporary thought in management, and various types of organizations seeking to apply and try to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF