In the present investigation two different types of fiber reinforced polymer composites were prepared by hand lay-up method using three different parameters (curing temperature, pressing load and fiber volume fraction). These composites were prepared from the polyester resin as the matrix material reinforced with glass fibers as first group of samples and mat Kevlar fibers as the second group, both with different volume fractions (4%, 8%, and 12%) of fibers. They were then tested by tensile strength and impact strength. The main objective in this study is to use Taguchi method for predicting the better parameters that give the better tensile and impact strength to the composites, and then preparing composites at these parameters and comparing them with the randomly used once. The experimental and analytical results showed that the Taguchi method was successful in optimizing the parameters that give the highest properties and it can find the most influential parameter regardless of the material used. Also it showed that the volume fraction was the most influential parameter on the tensile and impact strength. The difference between these composites was in the properties values and that the Kevlar composites have higher tensile and impact strength.
In this work, novel compounds of hydrazones derived from (2,4-dinitrophenyl) hydrazine were synthesized. Benzamides derivatives and sulfonamides derivatives were prepared from p-amino benzaldehyde. Then these compounds were condensed with (2,4-dinitrophenyl) hydrazine through Imine bond formation to give hydrazones compounds. The compounds were characterized using FT-IR (IR Affinity-1) spectrometer, and 1HNMR analyses. The majority of the compounds have a moderate antimicrobial activity against “Gram-positive bacteria staphylococcus Aureus, and staphylococcus epidermidis, Gram-negative bacteria Escherichia coli, and Klebsiella pneumoniae, and fungi species Candida albicans” using concentrations of 250 µg\ml.
In recent decades, there has been increasing interest in wastewater treatment because of its direct impact on the environment and public health. Over time, other forms of treatment have been developed and modified, including extended aeration. This process is included in the suspended growth system. In this paper, a comparative study was conducted between the efficiency of the extended aeration plant and that of the trickling filter plant in removal of BOD and COD. The method of comparison was done by knowing the value of the pollutant before and after the treatment and then extract the removal ratio of each pollutant within each plant. The results showed that the percentage of removal of BOD in the trickling filte
... Show MoreEvidences indicate that human beings were preoccupied with extreme forms of mental and psychic experiences long before they were recorded in literature. Greek myths and legends appear to include symbolizations of delusions, mania, and other bizarre forms of thought and behaviuor. The figure of the mad man or woman is analogous to the wild man, or the imaginary being who appears in various forms throughout western literature and art. Various studies refer to the notion of the wild man as a response to a persistent psychological urge. This urge gives an external expression and a valid form to the impulses of reckless physical self-assertion which is believed to be hidden in all of us, but is normally kept under control. Such impulses were exp
... Show MoreBackground: Poly propylene fibers with and without silane treatment have been used to reinforce heat cure denture base acrylic but, some mechanical properties like transverse strength, impact strength, tensile strength, hardness, wear resistance and wettability. Which are related to the clinical use of the prosthesis are not evaluated yet. The aim of the study is to identify the influence of incorporation of treated and untreated fibers on these properties Materials and methods: Eighty four heat cure acrylic specimens were constructed by conventional flasking technique. They were divided into six groups according to the tests and each group was subdivided into two subgroups control and experimental groups (seven samples for each subgroup
... Show MoreThe research aims to determine the strength of the relationship between time management and work pressure and administrative leadership, where he was taken a sample of (47) of the administrative leadership at the Higher Institute of security and administrative development in the Ministry of Interior was used questionnaire as a key tool in collecting data and information and analyzed the answers to the sample surveyed by using Statistical program (spss) in the arithmetic mean of the calculation and test (t) and the correlation coefficient, the research found the most important results: the existence of significant moral positive relationship between both time management and work pressure and administrative leadership, the leadership of th
... Show MoreA numerical method (F.E.)was derived for incompressible viscoelastic materials, the aging and
environmental phenomena especially the temperature effect was considered in this method. A
treatment of incompressibility was made for all permissible values of poisons ratio. A
mechanical model represents the incompressible viscoelastic materials and so the properties can
be derived using the Laplace transformations technique .A comparison was made with the other
methods interested with viscoelastic materials by applying the method on a cylinder of viscoelastic material surrounding by a steel casing and subjected to a constant internal pressure, as well as a comparison with another viscoelastic method and for Asphalt Concrete pro
In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show MoreIn this paper, the computational complexity will be reduced using a revised version of the selected mapping (SLM) algorithm. Where a partial SLM is achieved to reduce the mathematical operations around 50%. Although the peak to average power ratio (PAPR) reduction gain has been slightly degraded, the dramatic reduction in the computational complexity is an outshining achievement. Matlab simulation is used to evaluate the results, where the PAPR result shows the capability of the proposed method.
The basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More