Sludge from stone-cutting (SSC) factories and stone mines cannot be used as decorative stones, stone powder, etc. These substances are left in the environment and cause environmental problems. This study aim is to produce artificial stone composite (ASC) using sludge from stone cutting factories, cement, unsaturated resin, water, silicon carbide nanoparticles (SiC-NPs), and nano-graphene oxide (NGO) as fillers. Nano graphene oxide has a hydrophobic plate structure that water is not absorbed due to the lack of surface tension on these plates. NGO has a significant effect on the properties of artificial stone due to its high specific surface area and low density in the composite. Its uniform distribution in ASC is very low due to its hydrophobicity, which can be modified by using unsaturated resin and silicon carbide nanoparticles (SiC-NPs). The obtained results show a remarkable increase and improvement in the mechanical properties of the artificial stone composite in the samples containing modified NGO with SiC-NPs. These samples have less porosity, smoother, more polished surface and, high bending and compressive strength. The addition of these materials to the artificial stone has increased durability and reduced costs and has caused water repellency, and prevented the penetration of harmful ions such as chloride, etc.
A study to find the optimum separators pressures of separation stations has been performed. Stage separation of oil and gas is accomplished with a series of separators operating at sequentially reduced pressures. Liquid is discharged from a higher-pressure separator into the lower-pressure separator. The set of working separator pressures that yields maximum recovery of liquid hydrocarbon from the well fluid is the optimum set of pressures, which is the target of this work.
A computer model is used to find the optimum separator pressures. The model employs the Peng-Robinson equation of state (Peng and Robinson 1976) for volatile oil. The application of t
Asset management involves efficient planning of economic and technical performance characteristics of infrastructure systems. Managing a sewer network requires various types of activities so the network can be able to achieve a certain level of performance. During the lifetime of the network various components will start to deteriorate leading to bad performance and can damage the infrastructure. The main objective of this research is to develop deterioration models to provide an assessment tool for determining the serviceability of the sewer networks in Baghdad city the Zeppelin line was selected as a case study, as well as to give top management authorities the appropriate decision making. Different modeling techniques
... Show MoreThe aim of this paper, is to discuss several high performance training algorithms fall into two main categories. The first category uses heuristic techniques, which were developed from an analysis of the performance of the standard gradient descent algorithm. The second category of fast algorithms uses standard numerical optimization techniques such as: quasi-Newton . Other aim is to solve the drawbacks related with these training algorithms and propose an efficient training algorithm for FFNN
The natural ventilation in buildings is one of effective strategies for achieving energy efficiency in buildings by employing methods and ways of passive design, as well as its efficiency in providing high ranges of thermal comfort for occupants in buildings and raises their productivity. Because the concept of natural ventilation for many people confined to achieve through the windows and openings only, become necessary to provide this research to demonstrate the various passive design strategies for natural ventilation. Then, research problem: Insufficient knowledge about the importance and mechanism of the application of passive design strategies for natural ventilation in buildings. The research objective is: Analysis of passive desi
... Show Moreچکیدهی بحث
به نظر میآید که عالم هستی ، بر مسألهی « حرکت» استوار دارد ، و روح ، همیشه دنبال دگرگونی و تکامل و برتری میگردد. حرکت ، همهی چیزها در عالم إمکان را در بر میگیرد. حرکت در بنیادهای فکر مولانا جای مهمی دارد .اشعار مولانا مقدار زیادی از پویایی و حرکت برخوردارست، و از آنجایی که فعل ، عنصر تکانبخش جمله ، و کانون دلالت است ، ترجیح دادیم - علاوه بر دیگر عنا
... Show MoreThe implicit is the narrative technique used to give indirect hidden messages. To read between the lines means to understand the implicit meaning that is not directly indicated. This technique is expressed in two forms: the hypothesis and the implications of linguistic and non-linguistic rules. Nathalie Sarraute’s "Pour un oui ou pour un non" states this narrative method through her character’s verbal and non-verbal dialogue. The present paper discusses the implicit method and shows the reason behind which the author uses it in her play "Pour un oui ou pour un non".
Résumé
... Show MoreInelastic longitudinal electron scattering C2 form factor in 48Ca has been utilized
to study the effects of fitting parameters on the sigma meson exchange type
potentials as a residual interaction. By coupling the core particles with model space
particle, where the latter used as an active part of residual interaction in the so called
core polarization process, it is included as a correction with first order perturbation
theory to the main calculation of model space, and the excitation energy has been
carried out with ( ). A model space wave vectors are generated in full fp shell
model with FPD6 as effective interaction with mixing configuration technique and
harmonic oscillator as a single particle wave function.
Elastic magnetic electron scattering form factors in Ca-41 have been investigated. 1f7/2 subshell has been adopted as a model space with one neutron, and Millinar, Baymann and Zamick 1f7/2 model space effective interaction (F7MBZ) has been used as a model space effective interaction to generate the model space vectors for the M1, M3, M5, M7, and total form factors. Discarded space (core and higher configuration orbits) have been included through the first order perturbation theory to couple the partice-hole pair of excitation with 2ћω excitation energy in the calculation of the form factors and regarding the realistic interaction density dependence M3Y as a core polarization interaction with five sets of modern fitting parameters. Fina
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show More