Natural fibers and particles reinforced composites are being broadly used due to their bio and specific properties such as low density and easy to machine and production with low cost. In this work, water absorption and mechanical properties such as tensile strength, flexural strength and impact strength of recycled jute fibers reinforced epoxy resin were enhanced by treating these fibers with alkaline solution. The recycled jute fibers were treated with different concentration of (NaOH) solution at (25 0C) for a period of (24) hours. From the obtained results, it was found that all these properties are improved when fibers treated with (7.5wt% NaOH) related to untreated fibers. Conversely, the mentioned properties of composites decreased after fibers treated with (10wt% NaOH). In addition, the hybrid composite with recycled jute fibers and recycled walnut shell powder showed obvious enhancement in the above-mentioned properties.
What distinguishes the athlete in dealing with all stimuli is the ability to understand the cognitive rules through which he acts and directs behavior through thinking and regular planning methods in dealing with the environment in a realistic manner, and this comes through techniques and means based on modernity in obtaining information that makes the athlete arrange in His memory is the programs that are the most important crutch for relying on when he asks for them in applying and executing the skill assignment. One of the enhancers of awareness of variables is the ability of coaches to provide openness in modern ideas to find solutions, through which the player can sense and interpret events and produce outputs for quick and successful
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThis research aims to study to the strategic management of organizational conflict, which included (concept of conflict and development, types Altzimi conflict, ,management strategies organizational conflict) and its impact on job performance, which included( the concept of performance, elements functionality,) As well as the impact of the conflict on job performance has been selected Rashad training Hospital affiliated to the Department of Health in Baghdad's Rusafa, as the most important service hospitals with the exact specialty in psychiatry and its impact on the lives of citizens and how to enable the hospital aware of the strategic management of organizational conflict raises the level of functionality provided and make the
... Show MoreThe financial analysis of the published financial statements is the means that enables businessmen, financial institutions, financial analysts and others to conduct their studies and conclusions to obtain information that helps them in the decision-making process, including decisions related to investment. National in making the decision on the investment activity, for the period from 2012 to 2018, through the information provided by the annual financial statements, by selecting a set of indicators provided by the financial statements, namely (liquidity ratio, activity percentage, profitability ratios) to measure the extent of this ability Indicators in determining their role in making an investment decision.
Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show More
The current research aims to test the relationship of the impact of sustainable leadership as an independent variable in organizational happiness as a dependent variable, in the departments and divisions of the Tourism Authority, to come up with a set of recommendations that contribute to raising the level of organizational happiness in the authority. And based on the importance of the research topic in the General Authority, and the prominent role that this body plays in society, the researcher adopted the descriptive and analytical approach in carrying out this research, by collecting data from the departments and divisions staff of (160) respondents in an exclusively comprehensive
... Show MoreA novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)
In this article the nanoparticles synthesis of ZnO (Nps) by using the precipitation method at concentrations range (0.5, 0.25, 0.125, 0.0625, 0.03125) mg/mL and then activity was examined against Streptococcus spp that causing dental caries in vitro by well diffusion method, find these concentrations effected in these bacteria and better concentration is 0.03125. ZnO Nps were characterization by EDS to prove this particles are ZnO, and also characterized by atomic force microscope (AFM), X-ray Diffraction (XRD) and TEM, from these technic found that the average size about 30.52 nm and hexagonal shape. The UV-visible result reveals that the large band is observed at 340.8 nm, Zeta potential show that the surface charge is 30.19 mv an
... Show MoreThis study rigorously investigates three 3d transition metal carbide (TMC) structures via LDA and GGA approximations. It examines cohesive energy (Ecoh), Vickers hardness (Hv), mechanical stability, and electronic properties. Notably, most 3d TMCs exhibit higher cohesive energy than nitrides, and rs-TiC demonstrates a Vickers hardness of 25.66 GPa, outperforming its nitride counterpart. The study employs theoretical calculations to expedite research, revealing mechanical stability in CrC and MnC (GGA) and CrC (LDA in cc structure), while all 3d TMCs in rs and seven in zb structures show stability. Charge transfer and bonding analysis reveal enhanced covalency along the series, influenced by the interplay between p orbitals of carbon and d o
... Show More