Polymer electrolytes systems compose of (PEO+KI+I2) and (PEO+RbI+I2) with different concentration, and a fixed amount of ethylene carbonate (EC) and propylene carbonate (PC) over temperatures range 293-343 K prepared by solution cast method. The conductivity and dielectric constant of the gel electrolytes were studied. The conductivity of the electrolytes Ss & Hs increases steadily with increased concentration of salt KI and RbI. The higher value of conductivity of (4.7 10-3 @ RT S.cm-1) for S5 electrolyte which contains (KI 50%). Whereas the maximum amount of conductivity of (5.4 10³ @RT S.cm⁻ˡ) for H5 electrolyte which contains (RbI 50%) the ionic conductivity depends on the ionic radii of the migrating species (cation K⁺, Rb⁺) effect on it. As the temperature increase, the number of free ions also increases, thus increases the diffusion of ions through their free volume of the polymer. The dielectric constant decrease at higher frequencies due to the inability of dipoles to align quickly with the change of applied field. The dielectric constant proportional positively with variation temperature causes an increase in the dielectric constant. The higher the value of (εr), the better is the electrical conductivity.
<span lang="EN-US">In the last years, the self-balancing platform has become one of the most common candidates to use in many applications such as flight, biomedical fields, and industry. In this paper, the physical prototype of a proposed self-balancing platform that described the self-balancing attitude in the (X-axis, Y-axis, or biaxial) under the influence of road disturbance has been introduced. In the physical prototype, the inertial measurement unit (IMU) sensor will sense the disturbance in (X-axis, Y-axis, and biaxial). With the determined error, the corresponding electronic circuit, DC servo motors, and the Arduino software, the platform overcame the tilt angle(disturbance). Optimization of the proportional-integral-
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreFusarium wilt causes economic losses on tomatoes every year. Thus, a variety of chemicals have been used to combat the disease. Pesticides have been effective in managing the disease, but they keep damaging the environment. Recently, eco-friendly approaches have been used to control plant diseases. This study aimed to achieve an environmentally safe solution using biological agents to induce systemic resistance in tomato plants to control Fusarium wilt disease caused by Fusarium oxysporum f.sp. lycopersici (FOL) in the greenhouse. The pathogen (FOL) has been molecularly confirmed and the biological agents have been isolated from the Iraqi environment. The effectiveness of the biological agents has been tested and confirmed. Results showed t
... Show MoreAssessment of the in service behavior of asphalt stabilized subgrade soil under environmental impact has got little attention by the research workers. However, the sustainability of the roadway depends mainly on the welfare of its subgrade soil condition. In this work, Gypseous soil was stabilized with asphalt emulsion for subgrade usage, the durability of the mixture has been assessed in term of its ability to maintain the compressive strength when practicing the environmental impacts. Specimens of 38 mm in diameter , and 76 mm in height have been prepared with various water-asphalt percentages, and subjected to 30 cycles of (freezing-thawing), (heating-cooling) and (wetting-drying) processes. Specimens have been tested for unconfined comp
... Show MoreThe research starts from a fundamental problem about how top management team can realize the uncertainty. Strategic conversation has been introduced as a way for top management team to deal with uncertainties. Within the current research model, the strategic conversation was considered as an independent variable and uncertainty as dependent variable. The researcher used the survey method by distributed a questionnaire in the Administration and Economics College, University of Baghdad. Samples are 40 faculty participant of scientific committee members were distributed in seven scientific departments. The data were statistically analyzed by mean and the standard deviation. The hypotheses were tested through the use of correlation and regressi
... Show MoreR. Vasuki [1] proved fixed point theorems for expansive mappings in Menger spaces. R. Gujetiya and et al [2] presented an extension of the main result of Vasuki, for four expansive mappings in Menger space. In this article, an important lemma is given to prove that the iteration sequence is Cauchy under suitable condition in Menger probabilistic G-metric space (shortly, MPGM-space). And then, used to obtain three common fixed point theorems for expansive type mappings.
The study includes collection of data about cholera disease from six health centers from nine locations with 2500km2 and a population of 750000individual. The average of infection for six centers during the 2000-2003 was recorded. There were 3007 cases of diarrhea diagnosed as cholera caused by Vibrio cholerae. The percentage of male infection was 14. 7% while for female were 13. 2%. The percentage of infection for children (less than one year) was 6.1%, it while for the age (1-5 years) was 6.9%and for the ages more than 5 years was 14.5%.The total percentage of the patients stayed in hospital was 7.7%(4.2%for male and 3.4%for female). The bacteria was isolated and identified from 7cases in the Central Laboratory for Health in Baghdad. In
... Show MoreDeaf and dumb peoples are suffering difficulties most of the time in communicating with society. They use sign language to communicate with each other and with normal people. But Normal people find it more difficult to understand the sign language and gestures made by deaf and dumb people. Therefore, many techniques have been employed to tackle this problem by converting the sign language to a text or a voice and vice versa. In recent years, research has progressed steadily in regard to the use of computers to recognize and translate the sign language. This paper reviews significant projects in the field beginning with important steps of sign language translation. These projects can b