Preferred Language
Articles
/
alkej-223
Study Tensile Strength and Wear Rate for Unsaturated Polyester Resin and Nitrile butadiene Rubber Polymer Blend
...Show More Authors

Abstract

    Binary polymer blend was prepared by mechanical mixing method of unsaturated polyester resin with Nitrile Butadiene Rubber (NBR) with different weight ratios (0, 5, 10 and 15) % of (NBR). Tensile characteristics and wear rates of these blends were studied for all mixing ratios. The microstructure of fracture surfaces of the prepared samples were investigated by optical microscope. The results were showed that strain rates of the resin material increase after blending it with rubber while the ultimate tensile strength and Young’s modulus values of it will decrease. It is also noticed that the wear rate of resin decreases with increasing of (NBR) content.

Keywords: Polymer Blend, Tensile Strength, Wear Rate, Unsaturated Polyester, NBR.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Iraqi National Journal Of Nursing Specialties
Spiritual Coping Strategies for Patients with Chronic Renal Failure
...Show More Authors

Abstract:
Objectives: This study aims to (1) find out the association between patients' age, years of getting the disease, and their spiritual coping ability, and (2) investigate the differences in illness perception and spiritual coping ability between gender groups, level of education groups, monthly income groups, residence groups and satisfaction with health services groups.
Methodology
A descriptive correlational design is used in this study. The study sample includes a convenience sample of (158) patients with chronic kidney failure.
The study instrument consists of two parts; the first one focuses on participants’ sociodemographic characteristics, and the second part deals with participants’ spiritual coping by us

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Novel Heuristic Approach for Solving Multi-objective Scheduling Problems
...Show More Authors

    In this paper, we studied the scheduling of  jobs on a single machine.  Each of n jobs is to be processed without interruption and becomes available for processing at time zero. The objective is to find a processing order of the jobs, minimizing the sum of maximum earliness and maximum tardiness. This problem is to minimize the earliness and tardiness values, so this model is equivalent to the just-in-time production system. Our lower bound depended on the decomposition of the problem into two subprograms. We presented a novel heuristic approach to find a near-optimal solution for the problem. This approach depends on finding efficient solutions for two problems. The first problem is minimizing total completi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Quality of Life Assessment for Patients with Colorectal Cancer
...Show More Authors

Abstract A descriptive study to assess the quality of life (QOL) for patients with colorectal cancer. The study was conducted from Baghdad Teaching Hospital, Al-Yarmouk Teaching Hospital and Radiation Hospital and Nuclear medicine for the period from 1st July/2004 to 1st September/2004. The sample selected by purposive random of (50) patients diagnosed with colorectal cancer and all of them who were under chemotherapy treatment. A questionnaire was prepared for the purpose of the study and comprised of three parts including: 1- Socio-demographical characteristics. 2- Clinical characteristics. 3- and QOL

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 15 2025
Journal Name
Journal Of Engineering
Correction Procedure for the Determination of Soil Specific Surface
...Show More Authors

View Publication
Publication Date
Thu Feb 11 2021
Journal Name
Physics In Medicine & Biology
Stereoscopic portable hybrid gamma imaging for source depth estimation
...Show More Authors
Abstract<p>Advances in gamma imaging technology mean that is now technologically feasible to conduct stereoscopic gamma imaging in a hand-held unit. This paper derives an analytical model for stereoscopic pinhole imaging which can be used to predict performance for a wide range of camera configurations. Investigation of this concept through Monte Carlo and benchtop studies, for an example configuration, shows camera-source distance measurements with a mean deviation between calculated and actual distances of <5 mm for imaging distances of 50–250 mm. By combining this technique with stereoscopic optical imaging, we are then able to calculate the depth of a radioisotope source beneath a surfa</p> ... Show More
View Publication
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Gazi University Journal Of Science
Reliable Iterative Methods for Solving the Falkner-Skan Equation
...Show More Authors

View Publication
Crossref (8)
Crossref
Publication Date
Tue Apr 16 2019
Journal Name
Proceedings Of The 2019 5th International Conference On Computer And Technology Applications
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Runge-kutta Numerical Method for Solving Nonlinear Influenza Model
...Show More Authors
Abstract<p>The main object of this study is to solve a system of nonlinear ordinary differential equations (ODE) of the first order governing the epidemic model using numerical methods. The application under study is a mathematical epidemic model which is the influenza model at Australia in 1919. Runge-kutta methods of order 4 and of order 45 for solving this initial value problem(IVP) problem have been used. Finally, the results obtained have been discussed tabularly and graphically.</p>
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref