Preferred Language
Articles
/
ijs-2871
UV-Exposure effect on the mechanical properties of PEO/PVA blends
...Show More Authors

 

     Poly ethylene oxide PEO / Poly vinyl alcohol PVA  blends were prepared by cast method at different ratios of (25%PEO/75%PVA, 30%PEO/70%PVA, 35%PEO/65%PVA, 40%PEO/60%PVA, and 50%PEO/505PVA). Samples miscibility ,and thermal stability were studied  by using differential scanning calorimetry(DSC),and thermo gravimetric analysis (TGA) analysis. The results proved that there was one glass transition temperature (Tg=160°C) at 25%PEO\PVA ratio
)that was attributed to its miscibility. This miscibility associated with (Hydrogen  bonds) between (Hydroxyl group) in PVA, and PEO, whereas there were two glass transition temperature for the blends ratio more than 30%PEO,that was due its immiscibility. The results proved increase in glass transition temperature (Tg) with PEO loading increase: whereas the melting point was fixed about(Tm=310°C). TGA results showed that  PEO loading caused overlapping between degradation stages ,and shifting in the second stage to higher degradation temperature, that was due to the good  PVA, and PEO compatibility, and thermal  stability improved of polymer blends. The mechanical properties of the samples  involved were studied :it was found  that  the tensile strength decreased with PEO ratio increase: whereas ,the elongation at break increased  with PEO ratio . 25% PEO/PVA proved  better tensile strength than the others blend ratios and elongation-at-break values in comparison with that ratio more than 25%,which was due  to good miscibility. These results were enhanced with optical microscope and FTIR analysis. 25%PEO/PVA was sellected to  study the UV-Weathering effect on the mechanical properties according to its ultimate strength(26.67MPa) in comparision with the blends envolved.The stress strain curves for 25%PEO/PVA before and after UV-Weathering with periods of time(25,60,and 90Hr.) showed little changes in ultimate strength up  to (60Hr) exposure time,then there were little decrese in ultmate strength in(90Hr) exposure time . Ultimate tensile strength decrease was attributed to premature failur induced by polymer photo degradation. UV-Weathering caused yelowish of  exposed samples that was due to long chain conjugated polymer sequencesbond formation induced by oxidative  photo degradation . The results proved little changes within (60Hr),that was attributed to polymer stability.It was folowed by little changes in tensile strength and   the elongation at break decreased that was due to sample brittlence increase,which was induced  by irradiation ,that caused modulus of elasticity increase. It was experimentally observed that the value of thermal conductivity of (PVA= 0.099W/cm.K).The results proved decrease in thermal conductivity with PEO loading increase.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 26 2019
Journal Name
Iraqi Journal Of Science
Multi-Objective Shortest Path Model for Optimal Route between Commercial Cities on America
...Show More Authors

The traditional shortest path problem is mainly concerned with identifying the associated paths in the transportation network that represent the shortest distance between the source and the destination in the transportation network by finding either cost or distance. As for the problem of research under study it is to find the shortest optimal path of multi-objective (cost, distance and time) at the same time has been clarified through the application of a proposed practical model of the problem of multi-objective shortest path to solve the problem of the most important 25 commercial US cities by travel in the car or plane. The proposed model was also solved using the lexicographic method through package program Win-QSB 2.0 for operation

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Sep 29 2020
Journal Name
Iraqi Journal Of Science
Ultrasound Images Registration Based on Optimal Feature Descriptor Using Speeded Up Robust Feature
...Show More Authors

Image registration plays a significant role in the medical image processing field. This paper proposes a development on the accuracy and performance of the Speeded-Up Robust Surf (SURF) algorithm to create Extended Field of View (EFoV) Ultrasound (US) images through applying different matching measures. These measures include Euclidean distance, cityblock distance, variation, and correlation in the matching stage that was built in the SURF algorithm. The US image registration (fusion) was implemented depending on the control points obtained from the used matching measures. The matched points with higher frequency algorithm were proposed in this work to perform and enhance the EFoV for the US images, since the maximum accurate matching po

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Apr 04 2010
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Iraqi Breast Cancer: A Review on Patients' Demographic Characteristics and Clinico-Pathological Presentation.
...Show More Authors

Background: Breast Cancer is the commonest type of malignancy in Iraq. The Iraqi Cancer Registry displays an obvious trend for the disease to affect younger women with advanced stages at the time of presentation. This report presents a review on the main demographic characteristics and clinicopathological parameters in Iraqi patients diagnosed with breast cancer.
Patients & Methods: The study was carried out on 721 out of a total of 5044 patients (14.3%) who complained of palpable breast lumps that were diagnosed as cancer. The procedure for tumor nuclear DNA Ploidy assessment was performed by means of Image Cytometry. Immuno-cytochemical and  histochemical assays were applied for the determination of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
DNA Encoding for Misuse Intrusion Detection System based on UNSW-NB15 Data Set
...Show More Authors

Recent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jan 26 2020
Journal Name
Iraqi Journal Of Science
Diagenesis Processes Impact on Reservoir Quality in Carbonate Yamama Formation /Faihaa Oil Field
...Show More Authors

The Yamama Formation is a significant reservoir in the southern part of Iraq. This formation consists of limestone deposited throughout the Lower Cretaceous period within main retrogressive depositional series. This study aims to identify the impact of the diagenesis processes on the reservoir’s characteristics (porosity and permeability). Diagenesis processes’ analysis and the identification of Yamama Formation depended on the examination of more than 250 thin sections of the core samples from two wells that were used to determine different diagenetic environments and processes. The three identified diagenetic environments that affected Yamama reservoir were the marine, meteoric and burial environments. Eight diagenetic pr

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (7)
Scopus Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Sandwich Subordinations Imposed by New Generalized Koebe-Type Operator on Holomorphic Function Class
...Show More Authors

     In the complex field, special functions are closely related to geometric holomorphic functions. Koebe function is a notable contribution to the study of the geometric function theory (GFT), which is a univalent function. This sequel introduces a new class that includes a more general Koebe function which is holomorphic in a complex domain. The purpose of this work is to present a new operator correlated with GFT. A new generalized Koebe operator is proposed in terms of the convolution principle. This Koebe operator refers to the generality of a prominent differential operator, namely the Ruscheweyh operator. Theoretical investigations in this effort lead to a number of implementations in the subordination function theory. The ti

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Study on Candida spp. infection oral thrush and bacteria accompanied it from children
...Show More Authors

Oral swab samples were collected from 120 children (ages between one month- 10 years) who were infected with oral thrush and 30 healthy children. The percentages of isolated yeasts and Bacteria were 66.6% and 96.6% respectively. The dominate yeast and bacteria were Candida albicans and Staphylococcus aureus with of 78.7% and 34.4% respectively. Results revealed that the highest percent of infection with oral thrush disease was 32.5% in children within the age of 1-2 months.

View Publication Preview PDF
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (2)
Crossref