In this research study Hardness (shore D), Water absorption,
Flexural, Impact Test, and Fracture Toughness of polymer nano
composites. The polymer nano composites based on unsaturated
polyester resin reinforced with Kevlar fibers (K.F). The samples are
attended by hand lay – up method according to (Rule mixture) for
various volume fractions of unsaturated polyester resin, fiber and
carbon nanotube. The polyester resin was matrix strengthened with
3% volume fraction from Kevlar fiber and (0.5%, 1%, 1.5%, 2%)
volume fractions of carbon nanotube. The water absorption, hardness
(shore D), flexural test, impact test and toughness fracture properties
were studied. Results showed that the water absorption increase with
volume fraction increase of fiber with Carbon Nanotube, the sample
(polyester+3%K.F+0.5% CNTs) has lower water absorption than
other samples. The hardness (shore D), flexural test, impact test and
toughness fracture for the sample (polyester+3%C.F+0.5% CNTs)
has higher value for Nano- composites.
Background: Gastroesophageal reflux disease can lead to esophageal complications, including esophagitis, ulceration, stricture, hemorrhage, and Barrett’s esophagus. However, the spectrum of problems associated with GERD has expanded to extra esophageal sites. Chronic cough and asthma are two clinical problems caused or triggered by GERD. Spirometric changes among GERD associated cough and asthma still a topic of ongoing research.
Objectives: This study was designated to evaluate the spirometric picture of GERD associated cough and asthma subjects in relation to different clinical aspects of the disease including body mass index (BMI), disease duration, presence or absence of symptoms as well as endoscop
The environment in Mosul city is very rich, containing a wide variety of microorganisms which have not been recognised for a long time. Five new fungal genes were identified and registered for the first time in the gene bank. These included Fusarium falciforme 2020-06-MIK-F1 genes for 5.8S rRNA with Accession no. LC555741, Nectriaceae sp. 2020-06-MIK-F2 genes for ITS1 with Accession no. LC555742, Trichoderma asperellum MIK3 genes for 5.8S rRNA with Accession no. LC575020, Penecillum sp. MIK4 genes for 5.8S rRNA with Accession no. LC575021, and Neurospora crassa MIK5 genes for 5.8S rRNA with Accession no. LC575022. These fungal genes were isolated from wastewater of Khosr river in Mosul city/ Iraq, whi
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreDrilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.
In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show More<p>The objective of this paper is to study the dynamical behavior of an aquatic food web system. A mathematical model that includes nutrients, phytoplankton and zooplankton is proposed and analyzed. It is assumed that, the phytoplankton divided into two compartments namely toxic phytoplankton which produces a toxic substance as a defensive strategy against predation by zooplankton, and a nontoxic phytoplankton. All the feeding processes in this food web are formulating according to the Lotka-Volterra functional response. This model is represented mathematically by the set of nonlinear differential equations. The existence, uniqueness and boundedness of the solution of this model are investigated. The local and global stability
... Show More