Preferred Language
Articles
/
alkej-364
Influence of Nanoreinforced Particles (Al2O3) on Fatigue Life and Strength of Aluminium Based Metal Matrix Composite
...Show More Authors

Abstract

     In this investigation, Al2O3 nano material of 50nm particles size were added to the 6061 Al aluminium alloy by using the stir casting technique to fabricate the nanocomposite of 10wt% Al2O3. The experimental results observed that the addition of 10wt% Al2O3 improved the fatigue life and strength of constant and cumulative fatigue. Comparison between the S-N curves behaviour of metal matrix (AA6061) and the nanocomposite 10wt% Al2O3 has been made. The comparison revealed that 12.8% enhancement in fatigue strength at 107cycles due to 10wt% nano reinforcement. Also cumulative fatigue life of 10wt% nanocomposite was found to be increased by 33.37% and 39.58% for low-high and high-low loading sequences, respectively, compared to the metal-matrix cumulative life.

Keywords: Al2O3 nanoparticles, AA6061/10wt%, constant and cumulative fatigue, MMCs.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Engineering
Compressive Strength of Bottle-Shaped Compression Fields of Fiber Reinforced Concrete Members
...Show More Authors

Applying load to a structural member may result in a bottle-shaped compression field especially when the width of the loading is less than the width of bearing concrete members. At the Building and Construction Department – the University of Technology-Iraq, series tests on fibre reinforced concrete specimens were carried out, subjected to compression forces at the top and bottom of the specimens to produce compression field. The effects of steel fibre content, concrete compressive strength, transverse tension reinforcement, the height of test specimen, and the ratio of the width of loading plate to specimen width were studied by testing a total of tenth normal strength concrete blocks with steel fibre and one normal s

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Synthesis and Characterization of New Metal Complexes of α-Aminonitriles Derived from P- Toluidine and Aromatic Aldehydes
...Show More Authors

New metal complexes of some transition metal ions Co(II), Cu(II) , Cd(II) and Zn(II) were prepared by their reaction with previously prepared ligands HLI= (P-methyl anilino) phenyl acetonitrile and HLII = (P-methyl anilino) –P– chloro phenyl acetonitrile . The two ligands were prepared by Strecker’s procedure which includ the reaction of p- toluidine with benzaldehyde and P- chlorobenzaldehyde respectively. Structures were proposed depending on atomic absorption , i.r. and u.v.visible spectra in addition to magnetic susceptibility and electrical conductivity measurements.

View Publication Preview PDF
Crossref
Publication Date
Mon Aug 08 2022
Journal Name
Egyptian Journal Of Chemistry
Synthesis, spectroscopic and liquid crystalline studies of dithiocarbamat derivatives of pyrazole type ligands and their metal complexes
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
The influence of He-Ne Laser (632.8 nm) on Candida albicans isolated from complete upper dentures: In vitro study
...Show More Authors

The main objective of this study is to determine whether the use of He-Ne Laser (632.8 nm wavelength and power 0.5 mW) is an eligible and effective tool to kill or reduce the cell viability of Candida albicans isolated from complete upper dentures. Twenty one swabs were taken from the complete upper dentures. Only six swabs showed positive cultures for C. albicans. The isolate was divided into two groups, group I was not irradiated (control), and group II was irradiated by He-Ne Laser for different periods (10, 15, 20, and 30) min. After irradiation, the results showed a significant reduction in the viable cell count and colonies diameters especially at exposure periods 10 and 15 min. Although the low power He-Ne Laser was not eradicating t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 03 2018
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Condition assessment and rehabilitation for trunk sewer deterioration based on Semi-Markov model
...Show More Authors

An accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive conditi

... Show More
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Coronavirus Disease Diagnosis, Care and Prevention (COVID-19) Based on Decision Support System
...Show More Authors

              Automated clinical decision support system (CDSS) acts as new paradigm in medical services today. CDSSs are utilized to increment specialists (doctors) in their perplexing decision-making. Along these lines, a reasonable decision support system is built up dependent on doctors' knowledge and data mining derivation framework so as to help with the interest the board in the medical care gracefully to control the Corona Virus Disease (COVID-19) virus pandemic and, generally, to determine the class of infection and to provide a suitable protocol treatment depending on the symptoms of patient. Firstly, it needs to determine the three early symptoms of COVID-19 pandemic criteria (fever, tiredness, dry cough and breat

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref