Preferred Language
Articles
/
hha8uokBVTCNdQwCl4xA
Effect of Modified Nano-Graphene Oxide and Silicon Carbide Nanoparticles on the Mechanical Properties and Durability of Artificial Stone Composites from Waste
...Show More Authors

Sludge from stone-cutting (SSC) factories and stone mines cannot be used as decorative stones, stone powder, etc. These substances are left in the environment and cause environmental problems. This study aim is to produce artificial stone composite (ASC) using sludge from stone cutting factories, cement, unsaturated resin, water, silicon carbide nanoparticles (SiC-NPs), and nano-graphene oxide (NGO) as fillers. Nano graphene oxide has a hydrophobic plate structure that water is not absorbed due to the lack of surface tension on these plates. NGO has a significant effect on the properties of artificial stone due to its high specific surface area and low density in the composite. Its uniform distribution in ASC is very low due to its hydrophobicity, which can be modified by using unsaturated resin and silicon carbide nanoparticles (SiC-NPs). The obtained results show a remarkable increase and improvement in the mechanical properties of the artificial stone composite in the samples containing modified NGO with SiC-NPs. These samples have less porosity, smoother, more polished surface and, high bending and compressive strength. The addition of these materials to the artificial stone has increased durability and reduced costs and has caused water repellency, and prevented the penetration of harmful ions such as chloride, etc.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Mar 18 2010
Journal Name
Spe Projects, Facilities & Construction
Correlating Optimum Stage Pressure for Sequential Separator Systems
...Show More Authors
Summary<p>A study to find the optimum separators pressures of separation stations has been performed. Stage separation of oil and gas is accomplished with a series of separators operating at sequentially reduced pressures. Liquid is discharged from a higher-pressure separator into the lower-pressure separator. The set of working separator pressures that yields maximum recovery of liquid hydrocarbon from the well fluid is the optimum set of pressures, which is the target of this work.</p><p>A computer model is used to find the optimum separator pressures. The model employs the Peng-Robinson equation of state (Peng and Robinson 1976) for volatile oil. The application of t</p> ... Show More
View Publication
Scopus (15)
Crossref (13)
Scopus Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Engineering
Deterioration Model for Sewer Network Asset Management in Baghdad City (case study Zeppelin line)
...Show More Authors

Asset management involves efficient planning of economic and technical performance characteristics of infrastructure systems. Managing a sewer network requires various types of activities so the network can be able to achieve a certain level of performance. During the lifetime of the network various components will start to deteriorate leading to bad performance and can damage the infrastructure. The main objective of this research is to develop deterioration models to provide an assessment tool for determining the serviceability of the sewer networks in Baghdad city the Zeppelin line was selected as a case study, as well as to give top management authorities the appropriate decision making. Different modeling techniques

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fast Training Algorithms for Feed Forward Neural Networks
...Show More Authors

 The aim of this paper, is to discuss several high performance training algorithms fall into two main categories. The first category uses heuristic techniques, which were developed from an analysis of the performance of the standard gradient descent algorithm. The second category of fast algorithms uses standard numerical optimization techniques such as: quasi-Newton . Other aim is to solve the drawbacks related with these training algorithms and propose an efficient training algorithm for FFNN

View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
Passive Design Strategies to Enhance Natural Ventilation in Buildings "Election of Passive Design Strategies to Achieve Natural Ventilation in Iraqi Urban Environment with Hot Arid Climate"
...Show More Authors

The natural ventilation in buildings is one of effective strategies for achieving energy efficiency in buildings by employing methods and ways of passive design, as well as its efficiency in providing high ranges of thermal comfort for occupants in buildings and raises their productivity. Because the concept of natural ventilation for many people confined to achieve through the windows and openings only, become necessary to provide this research to demonstrate the various passive design strategies for natural ventilation. Then, research problem: Insufficient knowledge about the importance and mechanism of the application of passive design strategies for natural ventilation in buildings. The research objective is: Analysis of passive desi

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
بررسیِ حرکت¬شناختیِ افعالِ متنِ "ما زِ بالاییم و بالا می رویم" مولانا Kinetic Study of Mewlana Jalaluddin Rumi's "Mazi Balaeem we Bala Mi Roeem" Text's Verbs
...Show More Authors

چکیده­ی بحث

       به نظر می­آید که عالم هستی ، بر مسأله­ی « حرکت» استوار دارد ، و روح ، همیشه دنبال دگرگونی و تکامل و برتری می­گردد. حرکت ، همه­ی چیزها در عالم إمکان را  در بر می­گیرد. حرکت در بنیادهای فکر مولانا جای مهمی دارد .اشعار مولانا مقدار زیادی از پویایی و حرکت برخوردارست، و از آنجایی که فعل ، عنصر تکانبخش جمله ، و کانون دلالت است ، ترجیح دادیم - علاوه بر دیگر عنا

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
Hidden messages in (Pour un oui ou pour un non) of Nathalie Sarraute: Les messages cachés dans "Pour un oui ou pour un non" de Nathalie Sarraute
...Show More Authors

       The implicit is the narrative technique used to give indirect hidden messages. To read between the lines means to understand the implicit meaning that is not directly indicated. This technique is expressed in two forms: the hypothesis and the implications of linguistic and non-linguistic rules. Nathalie Sarraute’s "Pour un oui ou pour un non" states this narrative method through her character’s verbal and non-verbal dialogue. The present paper discusses the implicit method and shows the reason behind which  the author uses it in her play "Pour un oui ou pour un non".

Résumé

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
Inelastic longitudinal electron scattering C2 form factors in 48Ca nucleus by using sigma meson as a residual interaction.
...Show More Authors

Inelastic longitudinal electron scattering C2 form factor in 48Ca has been utilized
to study the effects of fitting parameters on the sigma meson exchange type
potentials as a residual interaction. By coupling the core particles with model space
particle, where the latter used as an active part of residual interaction in the so called
core polarization process, it is included as a correction with first order perturbation
theory to the main calculation of model space, and the excitation energy has been
carried out with ( ). A model space wave vectors are generated in full fp shell
model with FPD6 as effective interaction with mixing configuration technique and
harmonic oscillator as a single particle wave function.

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2010
Journal Name
Iraqi Journal Of Physics
Elastic magnetic electron scattering form factor in Ca-41 (M3Y fitting parameters consideration)
...Show More Authors

Elastic magnetic electron scattering form factors in Ca-41 have been investigated. 1f7/2 subshell has been adopted as a model space with one neutron, and Millinar, Baymann and Zamick 1f7/2 model space effective interaction (F7MBZ) has been used as a model space effective interaction to generate the model space vectors for the M1, M3, M5, M7, and total form factors. Discarded space (core and higher configuration orbits) have been included through the first order perturbation theory to couple the partice-hole pair of excitation with 2ћω excitation energy in the calculation of the form factors and regarding the realistic interaction density dependence M3Y as a core polarization interaction with five sets of modern fitting parameters. Fina

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus Clarivate Crossref