Polyimide/MWCNTs nanocomposites have been fabricated by solution mixing process. In the present study, we have investigated electrical conductivity and dielectric properties of PI/MWCNT nanocomposites in frequency range of 1 kHz to 100 kHz at different MWCNTs concentrations from 0 wt.% to 15 wt.%. It has been observed that the electrical conductivity and dielectric constants are enhanced significantly by several orders of magnitude up to 15 wt.% of MWCNTs content. The electrical conductivity increases as the frequency is increased, which can be attributed to high dislocation density near the interface. The rapid increase in the dielectric constant at a high MWCNTs content can be explained by the formation of a percolative path of the conducting network through the sample for a concentration corresponding to the percolation threshold. The high dielectric constant at a low frequency (1 kHz) is thought to originate from the space charge polarization mechanism. I-V characteristics of these devices indicate a significant increase in current with an increase in multi-walled carbon nanotube concentration in the composites. The SEM images show improved dispersion of MWCNTs in the PI matrix; this is due to the strong interfacial interactions.
There is no doubt that leadership is a social phenomenon , and human activity does not take place , but remained in the family cohesive have a common goal Alaho instil confidence in the same of her sons to be better , and the importance of this subject Arta researchers to identify the extent to which children in this phenomenon and to identify the causes and extent of its spread in the community , has been directing an open question (Appendix 1) to a group of kindergarten teachers , to learn about the characteristics of leadership that can be enjoyed by kindergarten children . The current research aims to:
1. Detect levels of leadership qualities among kindergarten children in the light of the characteristics of leadership skills
2
With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIn the past two decades, maritime transport traffic has increased, especially in the case of container flow. The BAP (Berth Allocation Problem) (BAP) is a main problem to optimize the port terminals. The current manuscript explains the DBAP problems in a typical arrangement that varies from the conventional separate design station, where each berth can simultaneously accommodate several ships when their entire length is less or equal to length. Be a pier, serve. This problem was then solved by crossing the Red Colobuses Monkey Optimization (RCM) with the Genetic Algorithm (GA). In conclusion, the comparison and the computational experiments are approached to demonstrate the effectiveness of the proposed method contrasted with other
... Show MoreFibromuscular dysplasia (FMD) is a noninflammatory and nonatherosclerotic arteriopathy that is characterized by irregular cellular proliferation and deformed construction of the arterial wall that causes segmentation, constriction, or aneurysm in the intermediate-sized arteries. The incidence of FMD is 0.42–3.4%, and the unilateral occurrence is even rarer. Herein, we report a rare case of a localized extracranial carotid unilateral FMD associated with recurrent transient ischemic attacks (TIAs) treated by extracranial-intracranial bypass for indirect revascularization. The specific localization of the disease rendered our case unique.
The application of the test case prioritization method is a key part of system testing intended to think it through and sort out the issues early in the development stage. Traditional prioritization techniques frequently fail to take into account the complexities of big-scale test suites, growing systems and time constraints, therefore cannot fully fix this problem. The proposed study here will deal with a meta-heuristic hybrid method that focuses on addressing the challenges of the modern time. The strategy utilizes genetic algorithms alongside a black hole as a means to create a smooth tradeoff between exploring numerous possibilities and exploiting the best one. The proposed hybrid algorithm of genetic black hole (HGBH) uses the
... Show MoreNumeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a
... Show MoreIn this paper, a new method of selection variables is presented to select some essential variables from large datasets. The new model is a modified version of the Elastic Net model. The modified Elastic Net variable selection model has been summarized in an algorithm. It is applied for Leukemia dataset that has 3051 variables (genes) and 72 samples. In reality, working with this kind of dataset is not accessible due to its large size. The modified model is compared to some standard variable selection methods. Perfect classification is achieved by applying the modified Elastic Net model because it has the best performance. All the calculations that have been done for this paper are in
Calcifying epithelial odontogenic tumour (CEOT) is a benign odontogenic neoplasm of epithelial origin that secretes an amyloid‐like protein tending towards calcification. This study aims to describe a case series from Iraq of one of the rarest odontogenic tumours.
Clinical and histopathological analysis of Calcifying epithelial odontogenic tumour cases that are archived at the oral pathology laboratory of the college of dentistry (Baghdad University) from 2000 to 2019.
Six cases of CEOT were regi
Background: Axial spondyloarthritis (axSpA) is an inflammatory, systemic rheumatic condition that mostly affects the axial skeleton. Tenascin-C (TN-C) is a hexameric glycoprotein of considerable size, upregulated in many inflammatory conditions, while Interleukin-17 (IL-17) a cytokine that plays an important role in SpA symptoms. Objective: to investigate the upregulation between the serum levels of TN-C and IL-17 in Iraqi axSpA patients and the disease characteristics. Patients and Methods: Seventy-four axSpA patients and 28 matched controls were studied. Fifty-four patients received a tumor necrosis factor inhibitor (TNFi) and 20 did not. Serum TN-C and IL-17 concentrations were determined using the ELISA technique. The Bath Ankyl
... Show More