Preferred Language
Articles
/
bsj-7309
The Effect of Electrospinning Parameters on Morphological and Mechanical Properties of PAN-based Nanofibers Membrane
...Show More Authors

The electrospun nanofibers membranes (ENMs) have gained great attention due to their superior performance. However, the low mechanical strength of ENMs, such as the rigidity and low strength, limits their applications in many aspects which need adequate strength, such as water filtration. This work investigates the impact of electrospinning parameters on the properties of ENMs fabricated from polyacrylonitrile (PAN) solved in N, N-Dimethylformamide (DMF). The studied electrospinning parameters were polymer concentration, solution flow rate, collector rotating speed, and the distance between the needle and collector. The fabricated ENMs were characterized using scanning electron microscopy (SEM) to understand the surface morphology and estimate the average fiber sizes. The membrane porosity percentage was measured using the dry-wet weight method. Also, a dynamic mechanical analyzer was used to determine the mechanical strength properties (tensile strength and Young's modulus) (DMA). The obtained results revealed that the polymer concentration and flow rate mainly affect the porosity and fiber size in ENMs. Increasing the polymer concentration improves the strength and flexibility, while the flow rate did not show a clear effect on the mechanical strength of ENMs. Both fibers collecting speed and spinning distance did not clearly impact the membrane morphology. ENMs flexibility significantly increased with increasing the collector speed and decreasing the spinning distance. Strong and flexible ENMs with small fibers can be fabricated using 10% PAN/DMF at a flow rate of 1 mL/h, collector speed of 140 rpm, and spinning distance of 13 cm.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Engineering
Laboratory Study on the Effect of Water-Cement Ratio on Strength Characteristics of Jet Grouting Columns
...Show More Authors

Jet grouting is one of the most widely applied soil improvement techniques. It is suitable for most geotechnical problems, including improving bearing capacity, decreasing settlement, forming seals, and stabilizing slopes. One of the difficulties faced by designers is determining the strength and geometry of elements created using this method. Jet grouted soil-cement columns in soil are a complicated issue because they are dependent on a number of parameters such as soil type, grout and water flow rate, rotation and lifting speed of monitor, nozzle jetting force, and water to cement ratio of slurry. This paper discusses the effect of the water-cement ratio on the physical and mechanical characteristics of soilcrete. In t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Study the genesis of the Moons of Jupiter and their Physical Properties
...Show More Authors

A developed model has been put for the hypothesis of capturing moons in explaining the origin of Jupiter moons, and study the change of the orbital properties of these satellites as well as the distance from the planet. Jupiter moons were divided into two types according to their physical and orbital properties, they are the moons , which are formed from the same material as the planet, so it was named the original moons ,while the moons that have been captured from the surrounding space was renamed exotic moons . And the moons of exotic origin asteroid belt and the Kuiper belt in the region which is behind Neptune, the origin of each clique of moons is an asteroid fragmented after colliding previously with another body and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
The Effect of Age and occupation on the Type and the Number of workers injuries in construction sector in Iraq
...Show More Authors

World statistics proved that the most of work dangerous accidents, which causes death, are occurred in the construction works. These accidents related to many causes such as loss of workers experience and ignoring rules of safety requirements, especially young workers. Due to the risk of accidents that may occur in the site of work, the idea of this study crystallized to show the relationship between the age of worker and number of injuries and accidents, to identify the causes of these injuries, and to put the appropriate solutions to avoid or reduce the risk of work injuries. Also, the research shows the main principles of safety requirements to forming a clear picture about the subject of the study. A questioner form was prepared to c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
The value of work to the Elits of prophets and its influence on cultural construction
...Show More Authors

Praise be to Allah and peace and blessings be upon our Prophet Muhammad and on his family and companions
Yet,
The prophets (peace be upon them) urged all thevalues and one of these is the value of work which is of a great importance, that all nations have gathered against us as the eaters gather at a bowl. One of the reasons of our weakness and the strength of our enemy is that we have neglected the value of work. And rather a large number of ignorant and uneducatedpeople started to believe that the means of living, triumph, gaining power, and establishing a civilization are given by Allah with neithergainingnoreffort from us. While we find in the past that Allah the Almighty narrated to us the story of Mary (Peace be upon her) and

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Color image compression based on spatial and magnitude signal decomposition
...Show More Authors

<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sat Aug 30 2025
Journal Name
مجلة منوال للدراسات التربوية والنفسية
The Negative Impact of Media on the Educational Identity of Society
...Show More Authors

This research aims the effects of negative media on the educational identity of community. Whereas display the concept of educational identity and its basic components, as well as the role of educational institutions for example the school and the family in form it and reinforcing this identity to individuals. The study showcasing the harmful impact of both traditional and modern media on identity and values, spotlight several examples like the promotion of consumerism and materialism through television programs. which results in the young people to adopt materialistic values like simplicity. The study concludes that media is a double-edged weapon: it can instill virtues and support education if used duly, but it can also weaken the educat

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Corporate Governance And Organizational Behavior Review
Impact of the electronic internal auditing based on IT governance to reduce auditing risk
...Show More Authors

This paper analysed the effect of electronic internal auditing (EIA) based on the Control Objectives for Information and Related Technologies (COBIT) framework. Organisations must implement an up-to-date accounting information system (AIS) capable of meeting their auditing requirements. Electronic audit risk (compliance assessment, control assurance, and risk assessment) is a development by Weidenmier and Ramamoorti (2006) to improve AIS. In order to fulfil the study’s objectives, a questionnaire was prepared and distributed to a sample comprising 120 employees. The employees were financial managers, internal auditors, and workers involved in the company’s information security departments in the General Company for Electricity D

... Show More
View Publication
Scopus (32)
Crossref (13)
Scopus Crossref