In the present investigation two different types of fiber reinforced polymer composites were prepared by hand lay-up method using three different parameters (curing temperature, pressing load and fiber volume fraction). These composites were prepared from the polyester resin as the matrix material reinforced with glass fibers as first group of samples and mat Kevlar fibers as the second group, both with different volume fractions (4%, 8%, and 12%) of fibers. They were then tested by tensile strength and impact strength. The main objective in this study is to use Taguchi method for predicting the better parameters that give the better tensile and impact strength to the composites, and then preparing composites at these parameters and comparing them with the randomly used once. The experimental and analytical results showed that the Taguchi method was successful in optimizing the parameters that give the highest properties and it can find the most influential parameter regardless of the material used. Also it showed that the volume fraction was the most influential parameter on the tensile and impact strength. The difference between these composites was in the properties values and that the Kevlar composites have higher tensile and impact strength.
The existence of the tax Coupled with the existence of the power of the political Sociality and the evolution of its concept differes according to the concept of the role of the state and its evolution in the economical life and it represents on of the main sources of funding one hand and an effective means that enables the state to intervene in various aspects of the economic life on the other hand. Tax also can be considered as a tool used to re-distribue the in class. Perhaps Iraq suffers from and in the marginalization to the role of taxes in funding and in turn the adoption of the Iraqi budget on oil revenues to finance the aspects of expenitvre which can pose a risk on the total Iraq
... Show MoreIn this paper, we consider a new approach to solve type of partial differential equation by using coupled Laplace transformation with decomposition method to find the exact solution for non–linear non–homogenous equation with initial conditions. The reliability for suggested approach illustrated by solving model equations such as second order linear and nonlinear Klein–Gordon equation. The application results show the efficiency and ability for suggested approach.
The use of bio-fruit waste has more attention in recent years because of the low cost of bio-fibers and the protection of the environment. In this study, the epoxy was reinforced with fruit residues (cantaloupe peel powder) in proportions (1%, 2%, 3%, 4%, 5%, 7.5%, and 10% by weight) as results of mechanical tests such as impact, hardness, flexural and compression.
Adding sub microns particle size cantaloupe peels particles with a weight ratio of 7.5% improves the epoxy mechanical properties, like impact strength, hardness, flexural strength, and compression strength by 59.43%, 5.8%, 45.7%, and 118.2%, respectively.
Using X-ray diffraction, the crystallite size ( D) of cantaloupe peel the powder was about (3 nm).
In
... Show MoreIn the present study, MIG welding is carried out on low carbon steel type (AISI 1015) by using electrode ER308L of 1.5mm diameter with direct current straight polarity (DCSP). The joint geometry is of a single V-butt joint with one pass welding stroke for different plate thicknesses of 6, 8, and 10 mm. In welding experiments, AISI 1015 plates with dimensions of 200×100mm and edge angle of 60o from both sides are utilized. In this work, three main parameters related to MIG welding process are investigated, which are welding current, welding speed, heat input and plate thickness, and to achieve that three groups of plates are employed each one consists of three plates. The results indicate that increasing the weld heat input (t
... Show MoreThis study aimed to improve the microencapsulation technique using a type coating the encapsulation Layer by Layer, which provide the best protection for life Lactobacillus casei in the extrusion method and use the microencapsulation of materials of the protein concentrated by protein 80% and the coating with alginate and chitosan have the results showed the variation in the difference of the binding process encapsulation yield among the types of coating through. by studying of these the effect o stability of the bio probiotic free cell and the three types coated towards three different concentrations from bile salts 0, 0.3, 0.5 and 0.7% when the periods of time different of zero and two and three hours at incubation the recorded
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThe basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P
... Show MoreMost includeding techniques of digital watermark even now working through the direct inclusion in the pixel without taking into account the level of compression (attack) that can go wrong, which makes digital watermark can be discarded easily. In this research, a method was proposed to overcome this problem, which is based on DCT (after image partitioned into non overlapped blocks with size 8×8 pixel), accompanied by a quantization method. The watermark (digital image) is embedded in DCT frequency domain seeking the blocks have highest standard deviation (the checking is only on the AC coefficients) within a predetermined threshold value, then the covered image will compressed (attacked) varying degrees of compression. The suggested met
... Show MoreThe gaps and cracks in an image result from different reasons and affect the images. There are various methods concerning gaps replenishment along with serious efforts and proposed methodologies to eliminate cracks in diverse tendencies. In the current research work a color image white crack in-painting system has been introduced. The proposed inpainting system involved on two algorithms. They are Linear Gaps Filling (LGF) and the Circular Gaps Filling (CGF). The quality of output image depends on several effects such as: pixels tone, the number of pixels in the cracked area and neighborhood of cracked area and the resolution the image. The quality of the output images of two methods (linear method: average Peak Signal to Noise Ratio (PS
... Show MoreIn this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show More