In this work, varying compositions of SiO2 micro filler were added
with the Polyvinyl Chloride (PVC) and samples have been prepared
using film casting technique. The results have been analyzed and
compared for PVC samples with (1 wt%, 3 wt%, 5 wt% and 10 wt%)
SiO2 micro filler. Mechanical characteristics such as tensile strength,
elongation at break and Young`s modulus were measured for all the
samples, where the tensile strength was increased from 8.39 Mpa for
purified PVC to 16 Mpa for 3% SiO2/PVC composite. Also, thermal
conductivity measurement values illustrated that composite materials
have a good thermal insulation at 10 wt. %, thermal conductivity was
decreased from 0.1684 W/m. K for PVC to 0.1310W/m. K at 10%
SiO2/PVC composite. Absorptivity test was also carried out for these
samples, the results of this study proved that PVC and SiO2-PVC
composites have low diffusion coefficients ranging from (10-13- 10-10
m2/s). Similarly, the dielectric properties like dielectric constant, loss
factor, resistance, and volume resistivity were performed; the
dielectric constant was increased from 2.1039 for PVC to 3.658 for
3% SiO2/PVC composites, while the dielectric loss factor was
decreased from 0.0144 for PVC to 0.0137 for 5%SiO2/PVC
composite. The values of resistance were increased from
17259.99(Ω) for purified PVC to 29185.75(Ω) for 10% SiO2/PVC
composites. Volume resistivity was increased from 0.3794 x109 (Ω.
cm) for PVC to 0.5179x109 (Ω. cm) for 10% SiO2/PVC composites.
FTIR spectroscopy was employed for all PVC-composite samples
and its results were investigated, there are systematic increases in
absorbance intensity spectra with SiO2 ratios attributed to good
distribution of inorganic fillers (Symmetric increases). The
microstructure and morphology of the prepared samples were
investigated by using optical microscope. It can be observed that, the
samples with (3% SiO2/PVC) are glossy and smooth without
agglomeration of (SiO2) particles in (PVC) matrix. The results
demonstrate that PVC-composite films prepared in this study show
promising potential to achieve good materials for plastic packaging
applications.
The aim of this study is to design a proposed model for a document to insure the mistakes of the medical profession in estimating the compensation for medical errors. The medical profession is an honest profession aimed primarily at serving human and human beings. In this case, the doctor may be subject to error and error , And the research has adopted the descriptive approach and the research reached several conclusions, the most prominent of which is no one to bear the responsibility of medical error, although the responsibility shared and the doctor contributes to them, doctors do not deal with patients according to their educational level and cultural and there are some doctors do not inform patients The absence of a document to insu
... Show MoreIn this work, new Schiff bases of quinazolinone derivatives (Q1-Q5) were synthesized from methyl anthranilate. The synthesis involved three steps. In the first step, methyl anthranilate was reacted with isothiocyanatobenzene, producing the thiourea derivative K1. The second step entailed reacting K1 with hydrazine hydrate, synthesizing 3-amino-2-(phenylamino) quinazolin-4(3H)-one (K2). The third step involved reaction of K2 with various aromatic aldehydes, yielding the Schiff bases derivatives Q1-Q5. The chemical structures of these compounds were identified by FT-IR,1H NMR and 13C NMR spectroscopy. The newly synthesized derivatives (Q1-Q5) were subjected to rigorous evaluation to assess their efficacy as corrosion inhibitors for ca
... Show MoreIt has been revealed previously that chronic liver disease (CLD) may be associated to hormonal fluctuations. The current study, therefore, aimed to evaluate some hormones in CLD patients compared with non-CLD individuals. This case control study was conducted at Gastroenterology and Hepatology Teaching Hospital, Medical city, Baghdad, Iraq during December 2021 to May 2022. One hundred and twenty male patients with CLD (age:14-75 years) and 120 control males (age: 24-70 years) were involved in this study. Serum samples were taken from all individuals and were then analysed for many tests which included hormones (Cortisol, testosterone, prolactin, insulin and thyroid stimulating hormone TSH); biochemical analysis (Prothrombin time
... Show MoreAbstract
The current research aims to identify the effect of the idea filtering strategy on the achievement of second-intermediate school female students in science. The two researchers adopted the experimental method and the experimental design with partial control in the two groups (experimental group and control group). The two researchers applied the research experience to a sample of students of the second intermediate grade in the school Martyrs of (Jiser Al Aimma for Girls) affiliated with the Baghdad Education Directorate / Rusafa /1 for the academic year (2021/2022), which was chosen intentionally. The number of female students in the research sample was (70) students, with (35) students for the ex
... Show MoreAbstract
The aim of the research is to identify the effect of using the self-questioning strategy on the achievement of fourth-grade students in science and the development of their reflective thinking in physics in the city of Baghdad. The research sample was divided into two groups: an experimental group of (20) students and a control group of (20) students. The researchers developed two tools: a test of (40) multiple-choice questions. The second tool is a test to measure the reflective thinking skills of fourth-grade students. It consists of (25) multiple-choice questions distributed on skills as follow: reflection and observation, detection of inaccuracies, reaching conclusions, giving clear explanations, an
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreWith the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show More