Ceramic to metal joining technique, which was used in this investigation includes the use of active filler alloy as a sandwich between the alumina and kovar alloy for brazing. High purity powdered metals of silver, copper, and additives of titanium were used to prepare the active filler alloy, through compacting the mixed powders and alloying in a furnace with argon atmosphere at the temperature of 800oC for 10 minutes. To use it as an active filler metal, it has been modified to a proper thickness. Two groups of alumina were prepared with different sintering temperatures (1450oC and 1650oC) and each group was tested under atmospheric pressure, vacuum furnace pressure of 2*10-4 torr and vacuum furnace pressure of 2*10-6 torr. All the process was at a same brazing temperature of 850C for 20 minutes. A reliable joint between the different types of alumina and kovar alloy was achieved by using vacuum furnace. On the other hand, weak bond was obtained by using atmospheric furnace. A maximum value of joint strength between alumina and kovar was obtained (130 MPa) under condition of 2*10-6 torr of vacuum furnace
This paper attempted to study the effect of cutting parameters (spindle speed and feed rate) on delamination phenomena during the drilling glass-polyester composites. Drilling process was done by CNC machine with 10 mm diameter of high-speed steel (HSS) drill bit. Taguchi technique with L16 orthogonal layout was used to analyze the effective parameters on delamination factor. The optimal experiment was no. 13 with spindle speed 1273 rpm and feed 0.05 mm/rev with minimum delamination factor 1.28. &
... Show MoreThe importance of our research is that it examines the causes and sources of the security challenges in the internal security environment of the GCC countries, and aims to address the most important issues that are of great interest, namely, the issue of inter-GCC differences and addressing the issues of regional security for the Gulf region, After it is one of the most dynamic and more polarized areas for the emergence of threats and challenges because of the multiplicity of sources of threat and their complexity due to the specificity of the strategic environment and the negative repercussions it can have on the Gulf region, especially the issue of regional security of the Gulf Cooperation Council Which has become a magnet for competing i
... Show MoreOrganizations of various activities strive to excel and continue in light of the challenges they face, so they seek to have leaders and workers in them for the ingenuity that is reflected in their excellence in work and achievement that is achieved through the adoption of the best modern technological technologies to reach Organizations to the best levels and thus achieve their goals easily and successfully. The research aims are to know the correlation and impact between organizational proficiency and the dimensions of Organizations excellence (leadership excellence, and distinguish subordinates and excellence in organizational structure) at the Cotton Industries Company through the adoption of a unit of measurement which
... Show MoreThe research aims to measure and analyze the reality of liquidity in the Rasheed Bank and determine their impact on risk and return in order to identify the extent of the efficiency of the management of liquidity by the Bank and how to employ them in a profitable investment areas, and analysis of the compatibility of the liquidity gap and gap the balance sheet (sensitive interest rate) and affected net interest Change prices, and through the adoption of style ladder recommended Meritassets and liabilities by the Central Bank of Iraq, as it is an important and vital aspects in commercial banks' management, when there is a commonly used optimizing the resources of the bank available, it means that there is a banking efficient management is
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreInvestments in shares represent an essential component of companies’ assets and a source of profit making resources. These investments are linked to the areas of trading and speculation, which is reflected on their market value, which makes accounting for and evaluating these investments require their own accounting standards, and thus several international standards were issued regarding this as well as a statement of their impact on growth Sustainable, as the research problem is to show the impact of measuring investments in shares according to international accounting and financial reporting standards on the sustainable growth of economic units, the research sample and its reflection on audit procedures. In accordance with i
... Show MoreSilver selenide telluride Semiconducting (Ag2Se0.8Te0.2) thin films were by thermal evaporation at RT with thickness350 nm at annealing temperatures (300, 348, 398, and 448) °K for 1 hour on glass substrates .using X-ray diffraction, the structural characteristics were calculated as a function of annealing temperatures with no preferential orientation along any plane. Atomic force microscopy (AFM) and X-ray techniques are used to analyze the Ag2SeTe thin films' physical makeup and properties. AFM techniques were used to analyze the surface morphology of the Ag2SeTe films, and the results showed that the values for average diameter, surface roughness, and grain size mutation increased with annealing temperature (116.36-171.02) nm The transm
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show More