Iron-Epoxy composite samples were prepared by added
different weight percentages (0, 5, 10, 15, and 20 wt %) from Iron
particles in the range of (30-40μm) as a particle size. The contents
were mixed carefully, and placed a circular dies with a diameter of
2.5 cm. Different mechanical tests (Shore D Hardness, Tensile
strength, and Impact strength ) were carried out for all samples. The
samples were immersed in water for ten weeks, and after two weeks
the samples were take-out and drying to conducting all mechanical
tests were repeated for all samples. The hardness values increased
when the Iron particle concentration increased while the Impact
strength is not affected by the increasing of Iron particles
concentration. The tensile strength results reveal that the tensile
strength and the strain values of composite samples decreases when
the Iron particles concentration increase. After conducted
immersion processes the results of hardness are reduced wears the
results of tensile strength and the impact strength are increased.
This study aimed to identify the degree of frustration and guilt among addicts who hurt themselves with drug, and to know the addicts perspective who are in treatment clinics and rehabilitation centers in Palestine, in order to achieve this goal aDeterminationThe study population has been identified , this study population consisted of ' (82) addict, the researcher used the descriptive analytical method which is appropriate for this study, so the researcher questioned the addicts who are in treatment clinics and rehabilitation centers in Palestine and analyze their responses in light of some of the variables.
The study results showed that drug addicts who ar
... Show MoreThis study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MorePrograms directed to children through the media in general and in television in particular are among the main factors that help in forming the cultural and educational values of this important segment of society, and in light of this the study problem was identified in answering a major question: What are the cultural and educational values that Ajyal channel seeks Space planted in children through my program, Iftah Ya Simsim (in its new season) and Friends of Ajyal? , While the objectives of the study were evident in identifying the most prominent cultural and educational values that the Ajyal satellite channel worked to instill in children, and identifying the nature of the techniques used by Ajyal channel in providing the value conten
... Show MoreTraditionally, path selection within routing is formulated as a shortest path optimization problem. The objective function for optimization could be any one variety of parameters such as number of hops, delay, cost...etc. The problem of least cost delay constraint routing is studied in this paper since delay constraint is very common requirement of many multimedia applications and cost minimization captures the need to
distribute the network. So an iterative algorithm is proposed in this paper to solve this problem. It is appeared from the results of applying this algorithm that it gave the optimal path (optimal solution) from among multiple feasible paths (feasible solutions).
The research demonstrates new species of the games by applying separation axioms via sets, where the relationships between the various species that were specified and the strategy of winning and losing to any one of the players, and their relationship with the concepts of separation axioms via sets have been studied.
Summary of the research Family violence, its causes and effects on society (women and children). Search Goal: The current research aims to identify: 1. Causes of family and social violence (for children and women). 2. How to process. research importance : Domestic violence is a major and devastating problem that has a negative and direct impact on children in particular and women or mothers in general. The problem of domestic violence is linked to many factors and individual, social, economic, psychological and environmental variables, which makes one theory that claims to be inaccurate. It is difficult to understand the nature of family violence without linking it to some of the concepts related to it. The negative effects that may lead
... Show MoreBackground: Avascular necrosis (AVN) is defined as cellular death of bone components due to interruption of the blood supply; the bone structures then collapse, resulting in bone destruction, pain, and loss of joint function. AVN is associated with numerous conditions and usually involves the epiphysis of long bones, such as the femoral head. In clinical practice, AVN is most commonly encountered in the hip. Early diagnosis and appropriate intervention can delay the need for joint replacement. However, most patients present late in the disease course. Without treatment, the process is almost always progressive, leading to joint destruction within 5 years.Treatment of a vascular necrosis depends mainly on early diagnosis which mainly base
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreThis study represents an optical biosensor for early skin cancer detection using cysteine-cupped CdSe/CdS Quantum Dots (QDs). The study optimizes QD synthesis, surface, optical functionalization, and bioconjugation to enhance specificity and sensitivity for early skin cancer cell detection. The research provides insights into QD interactions with skin cancer biomarkers, demonstrating high-contrast, precise cellular imaging. Cysteine-capped CdSe/CdS absorption spectra reveal characteristic peaks for undamaged DNA, while spectral shifts indicate structural changes in skin-cancer-damaged DNA. Additionally, fluorescence spectra show sharp peaks for undamaged DNA and notable shifts and intensity variations when interacting with skin cancer. This
... Show MoreSimulation of the Linguistic Fuzzy Trust Model (LFTM) over oscillating Wireless Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network
... Show More