Preferred Language
Articles
/
alkej-147
Evaluation Study of Glass Fiber Reinforced Polyester and Kevlar Reinforced Polyester by Taguchi Method
...Show More Authors

     In the present investigation two different types of fiber reinforced polymer composites were prepared by hand lay-up method using three different parameters (curing temperature, pressing load and fiber volume fraction). These composites were prepared from the polyester resin as the matrix material reinforced with glass fibers as first group of samples and mat Kevlar fibers as the second group, both with different volume fractions (4%, 8%, and 12%) of fibers. They were then tested by tensile strength and impact strength. The main objective in this study is to use Taguchi method for predicting the better parameters that give the better tensile and impact strength to the composites, and then preparing composites at these parameters and comparing them with the randomly used once. The experimental and analytical results showed that the Taguchi method was successful in optimizing the parameters that give the highest properties and it can find the most influential parameter regardless of the material used. Also it showed that the volume fraction was the most influential parameter on the tensile and impact strength. The difference between these composites was in the properties values and that the Kevlar composites have higher tensile and impact strength.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Lossless Data Hiding Using L·SB Method
...Show More Authors

A loS.sless (reversible) data hiding (embedding) method  inside  an image  (translating medium)  - presented   in  the  present  work  using  L_SB (least  significant  bit). technique  which  enables  us to translate   data  using an  image  (host  image),  using  a  secret  key, to  be  undetectable  without losing  any  data  or  without   changing   the  size  and  the  external   scene (visible  properties) of the image, the hid-ing data is then can  be extracted (without  losing)   by reversing &n

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
ON NAIVE TAYLOR MODEL INTEGRATION METHOD
...Show More Authors

Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More
Publication Date
Sun Dec 02 2018
Journal Name
Journal Of The College Of Education For Women
Human rights in reality and ambition
...Show More Authors

The research aims to focus on the human rights guarantees as they are subjected to continuous violations due to changes, wars and conflicts between nations and people, especially in the Arab world and the third world due to political, social, economic and environmental conditions and the failure of democratic tracks under the current reality.

Keyword: Human rights, Reality, Ambition.

View Publication Preview PDF
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Recipe configuration between installers and Navin
...Show More Authors

One of the issues that occupied the doctrinal mind and differed the attention of scientists is the question of (the quality of the composition of God), so each team of scientists went the doctrine that led him to his evidence.
I wanted through this research to stand on the truth of the matter according to what I reached after looking at the views of the people and their evidence and direct the dispute between scientists.
It was presented with an introduction that was an introduction to the issue, where it began with the introduction of the definition of attributes, and then began to define the composition and view the views of scientists and evidence, and then concluded it with a conclusion mentioning what I have reached.

View Publication Preview PDF
Publication Date
Tue Dec 28 2021
Journal Name
College Of Islamic Sciences
The concept of the phenomenon of nuns: an analytical ideological study
...Show More Authors

ملخص البحث باللغة الإنجليزية

The concept of the phenomenon of nuns: an analytical ideological study

Dr. Samia bint Yassin Al-Badri

Department of Islamic Doctrine & Contemporary Ideologies

College of Shariʿah & Islamic Studies

Qassim University

 

The study of concepts is one of the main pillars of doctrinal studies, in order to understand the formation of the concept, and to understand its contexts in religious sources, in order to be systematically criticized; So, this research came with the title:

The concept of the phenomenon of nuns, an analytical doctrinal study

The study concluded with resu

... Show More
View Publication Preview PDF
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
The origins of the structure of nominative pronouns, a linguistic study
...Show More Authors

The Arabic pronouns received a lot of attention from the ancient Arab grammarians, so they explained their origins, the different forms of their structure, and the aspects of the Arabs’ use of them, and explained the aspects and reasons for these uses, with what they had of linguistic insight, which guided them to clarify the truth of these pronouns.
And recently, this research seeks new knowledge of the development of the structure of the nominative pronouns (he), (she), (them), (taa), and (waw) between dialects and towards classical Arabic, by analyzing the structure of these pronouns into their components. Its linguistic formulas are traced from the ancient Arabic texts, and by ancient I mean the texts of the era of linguistic ci

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Study and Analysis of the Factors that Affect the Efficiency of Small and Medium Enterprises in the Kingdom of Saudi Arabia
...Show More Authors

Encouraging micro-enterprises for comprehensive economic development are crucial to achieve the ambitious vision 2030 of the Kingdom of Saudi Arabia.

 Small and Medium enterprises are inputting around 15.5 per cent to GDP while 33 per cent contribution as a private sector to Saudi Arabia's gross domestic product (GDP). This study aims to identify the most important factors that affect the efficiency of small enterprises in Saudi Arabia. To accomplish this objective, the study was conducted for small projects via the comprehensive inventory method under the supervision of the Institute of Entrepreneurship. A total of 282 questionnaires were collected from entrepreneurs and the differentiation analysis

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Evaluation of Mechanical Strength of Epoxy Polymer Concrete Reinforcement with Different Types of Fibers
...Show More Authors

 Polymer composite materials were prepared by mixing epoxy resin with sand particles in three different grain size (150-300 ), (300-600 ) and (600- 1200) μm . The weight of epoxy was 15%, 20%, 25% and 30% of the total weight. Compression  strength and flexural strength tests were carried out for the prepared samples .The percentages of epoxy resin at 20% wt and 25% wt showed best mechanical properties for all grain sizes .These percentages were adopted to fill the void between particles sand which have two different size ranges (150-600) μm and {(150-300) & (600-1200)} μm respectively to obtain more dense material. The results showed that the strength of polymer composite at 20% resin is higher than 25% resin. The

... Show More
View Publication Preview PDF
Crossref (2)
Crossref