In this study, industrial fiber and polymer mixtures were used for high-speed impact (ballistic) applications where the effects of polymer (epoxy), polymeric
mixture (epoxy + unsaturated polyester), synthetic rubber (polyurethane), Kevlar fiber, polyethylene fiber (ultra High molecular weight) and carbon fiber.
Four successive systems of samples were prepared. the first system component made of (epoxy and 2% graphene and 20 layer of fiber), then ballistic test was
applied, the sample was successful in the test from a distance of 7 m. or more than, by using a pistol personally Glock, Caliber of 9 * 19 mm. The second
system was consisting of (epoxy, 2% graphene, 36 layers of fiber and one layer of hard rubber), it was succeeded in testing from a distance of 4 m or more than, by using a pistol personally Glock, Caliber of 9 * 19 mm. The third system made of mixture (80% epoxy + 20% unsaturated polyester) and44 layers of
fiber and 2% graphene as a composite with 20 layers of fiber outside the composite material, it was successful in testing by using a semi-automatic rifle
(AK47) Caliber of 7.62 * 51 mm from a distance of 15 m or more than. The fourth system was prepared from alumina ceramic plate Al2O3 (from damaged
laboratory furnace linings) with composite consisted of (a mixture (epoxy 80%+ 20% unsaturated polyester) and 20% silicon carbide). placed in a cloth bag
together. It was successful in testing by using a semi-automatic rifle (AK47) Caliber of 7.62 * 51 mm from a distance of 15 m or more than.
DBN Rashid, INTERNATIONAL JOURNAL OF DEVELOPMENT IN SOCIAL SCIENCE AND HUMANITIES, 2021
The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show MoreChemical bath deposition was used to synthesize ZnO nanorods (NRs) on glass and fluorine_doped tin oxide (FTO) substrates. X-ray diffraction was performed to examine the crystallinity of ZnO nanorod. Results showed that ZnO NRs had a wurtzite crystal structure. Field emission scanning electron microscopy images showed that glass sample had rod-like structure distribution with (50 nm) diameter and average length of approximately (700 nm), whereas the FTO-coated glass sample had 25 nm diameter and average length of approximately 950 nm. The direct optical transition band gaps of the glass and FTO_coated glass samples were( 4 and 4.43 eV), respectively. The structural and optical properties of the synthesized ZnO p
... Show MoreAccording to the theory of regular geometric functions, the relevance of geometry to analysis is a critical feature. One of the significant tools to study operators is to utilize the convolution product. The dynamic techniques of convolution have attracted numerous complex analyses in current research. In this effort, an attempt is made by utilizing the said techniques to study a new linear complex operator connecting an incomplete beta function and a Hurwitz–Lerch zeta function of certain meromorphic functions. Furthermore, we employ a method based on the first-order differential subordination to derive new and better differential complex inequalities, namely differential subordinations.
Abstract
Digital repositories are considered one of the integrated collaborative educational environments that help every researcher interested in developing the education and educational process. The learning resources provided by the repositories are suitable for every researcher, so digital information can be stored and exchanged by ensuring the participation and cooperation of researchers, teachers, and those who are interested, as well as curricula experts, teachers, and students, to exchange each other’s experiences in constantly updating that information as a reason for developing their performance in education. This reveals the importance of the role of educational digital institutions by providing and
... Show Moreاعداد : أسرار عبد الزهراء علي - علاء الدين - ب. جواد حسن عودة عبد الله - جامعة بغداد جامعة بغداد كلية البصرة للعلوم والتكنولوجيا - كلية الإدارة والاقتصاد. كلية الإدارة والاقتصاد المركز الديمقراطي العربي – مجلة القانون الدستوري والعلوم الإدارية : العدد التاسع شباط – فبراير 2021 المجلد 3 ،