This work describes the weathering effects (UV-Irradiation, and Rain) on the thermal conductivity of PS, PMMA, PS/PMMA blend for packaging application. The samples were prepared by cast method at different ratios (10, 30, 50, 70, and 90 %wt). It was seen that the thermal conductivity of PMMA (0.145 W/m.K), and for PS(0.095 W/m.K), which increases by PS ratio increase up to 50% PS/PMMA blend then decreased that was attributed to increase in miscibility of the blend involved. By UV-weathering, it was seen that thermal conductivity for PMMA increased with UV-weathering up to (30hr) then decreased, that was attributed to rigidity and defect formation, respectively. For 30%PS/PMMA, there results showed unsystematic decrease in thermal conductivity, which was attributed to unsystematic degradation. By Rain-weathering, thermal conductivity PS, PMMA, and 30 %PS, PMMA, it was seen systematic decreased in PS and 30 % PS/PMMA thermal conductivity; and systematic decrease in PMMA thermal conductivity. That due to the water diffusion in the samples that created some voids, bubbles, and results in decrease in thermal conductivity. This result was attributed to the decrease in adhesive between the components of polymer systems. The results suggested that the samples involved could be used for packaging application.
The development of information systems in recent years has contributed to various methods of gathering information to evaluate IS performance. The most common approach used to collect information is called the survey system. This method, however, suffers one major drawback. The decision makers consume considerable time to transform data from survey sheets to analytical programs. As such, this paper proposes a method called ‘survey algorithm based on R programming language’ or SABR, for data transformation from the survey sheets inside R environments by treating the arrangement of data as a relational format. R and Relational data format provide excellent opportunity to manage and analyse the accumulated data. Moreover, a survey syste
... Show More'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal
The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities. Cloud computing can be used to store big data. The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r
... Show MoreFuture generations of wireless communications systems are expected to evolve toward allowing massive ubiquitous connectivity and achieving ultra-reliable and low-latency communications (URLLC) with extremely high data rates. Massive multiple-input multiple-output (m-MIMO) is a crucial transmission technique to fulfill the demands of high data rates in the upcoming wireless systems. However, obtaining a downlink (DL) training sequence (TS) that is feasible for fast channel estimation, i.e., meeting the low-latency communications required by future generations of wireless systems, in m-MIMO with frequency-division-duplex (FDD) when users have different channel correlations is very challenging. Therefore, a low-complexity solution for
... Show MoreWireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati
... Show MoreKnowledge represents the foundation stone for the work of all organizations, are working who leads the thinking of individuals is the ability that leads to behavior based on rationality, it is the work that creates value to the organization and thus gain access to performance winning where that knowledge is a new type of capital based on the thought and experience and is the so-called intellectual capital, which is renewable and is constantly evolving. The study sought to explain the role of the climax knowledge in achieving the highest levels of performance Organizational and then access to the performance winning in educational organizations the study sample, was found to be a co
... Show MoreA novel metal complexes Cu (II), Co (II), Cd (II), Ru (III) from azo ligand 5-((2-(1H-indol-2-yl)
ethyl) diazinyl)-2-aminophenol were synthesized by simple substitution of tryptamine with 2-aminophenol.
Structures of all the newly synthesized compounds were characterized by FT IR, UV-Vis, Mass spectroscopy
and elemental analysis. In addition measurements of magnetic moments, molar conductance and atomic
absorption. Then study their thermal stability by using TGA and DSC curves. The DCS curve was used to
calculate the thermodynamic parameters ΔH, ΔS and Δ G. Analytical information showed that all complexes
achieve a metal:ligand ratio of [1:1]. In all complex examinations, the Ligand performs as a tri
Administrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show More