In this study, an industrial source) E-Glass fiber) and a natural source (chestnut filler) were combined to improve the properties of polyesters. Hand-layup technique was applied in this work. Polyester (UPE) were reinforced with E-glass fibers, then reinforced with nano chestnut particles. All composites were prepared with (10% wt.) of E-glass for all prepared sheet and this ratio applied for Nano chestnut composite to preparing nano hybrid composites, Nano chestnut particles were used to reinforce E-glass/UPE composites with weight ratio (3%, 6% and 9% wt.). The evaluated mechanical performances for E-glass/NCSP polyester composite were tensile strength, impact strength and hardness. The higher ultimate tensile strength, Young’s modulus and impact strength was appeared for the E-glass/UPE composite with 3%wt nano chestnut filler only. While the composites with 6% and 9% wt. showed failure in these properties. Hardness property was high with the three percentage addition of nano powder of chestnut.
Fabrication and investigation of the properties of CdSe/ZnS core/shell for the luminescent solar concentrates (LSC) application is presented. An increase of the efficiency of a silicon solar cell was obtained by applying the LSC. The increase was a result of the optical properties of the semiconductor nanoparticles CdSe/ZnS core/shell that were deposited over the top surface of the silicon solar cell facing the illumination source (Halogen lamp). The gravity force was invested for the film deposition process.The optical properties of these nanoparticles were studied. The absorption spectra for the CdSe/ZnS core-shell were 270-600nm, i.e., located within the spectral response area of the examined solar cell. The energy gap values for CdSe
... Show MoreIn recent years it has spread the used of e-commerce sites quite dramatically. Thus, these sites have become display huge number of diverse products. It became difficulty for the customer to choose what he/she wants from this product. The recommender systems are used to help customers to finding the desired product of their interests and proved to be an important solution to information overload problem.
This paper, designed a recommendation system based on content, which is usually textual description. Furthermore, the proposed system uses cosine similarity function to find the similarities among the characteristics of various products, and nominate a suitable product closer to customer satisfaction. The experimental result shows tha
Face recognition system is the most widely used application in the field of security and especially in border control. This system may be exposed to direct or indirect attacks through the use of face morphing attacks (FMAs). Face morphing attacks is the process of producing a passport photo resulting from a mixture of two images, one of which is for an ordinary person and the other is a judicially required. In this case, a face recognition system may allow travel of persons not permitted to travel through face morphing image in a Machine-Readable Electronic Travel Document (eMRTD) or electronic passport at Automatic Border Control (ABC) gates. In creating an electronic passport, most countries rely on applicant to submit ima
... Show MoreA description of the implementation of integrated practical work in a remote laboratory was presented in this paper. The student, in real time, can access an online web page in order to manipulate a practical work of digital electronics. This work is based on the use of an embedded system PcDuino. The hardware architecture and software solutions are described, as well as the supervision tool that allows the student to follow changes in the output states of the Practical Work remotely.
E-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas
... Show MoreThe importance of websites appears as a modern tool that helps people connect with each other and exchange information rapidly. An increase number of new websites have been created in public or private spheres, which benefit individuals and society as a whole. This research aims to design a website specialized in marketing sustainable fashion that meets the needs of the Saudi market. It followed a descriptive and analytical approach. A survey has been conducted on a random sample of e-marketing users. The sample number is 101 users. The study resulted in: Determining the effectiveness of e-marketing, studying consumer purchasing tendencies, and designing a website for sustainable fashion based on the survey’s results. The study recomme
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreTo damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. Double input multiband Power system stabilizers (PSSs) were used to damp out low-frequency oscillations in power system. Among dual-input PSSs, PSS4B offers superior transient performance. Power system simulator for engineering (PSS/E) software was adopted to test and evaluate the dynamic performance of PSS4B model on Iraqi national grid. The res
... Show MoreIn the partition theory, there is more then one form of representation of dedication, most notably the Abacus diagram, which gives an accurate and specific description. In the year 2019, Mahmood and Mahmood presented the idea of merging more than two plans, and then the following question was raised: Is the process of separating any somewhat large diagram into smaller schemes possible? The general formula to split e-abacus diagram into two or more equal or unequal parts was achieved in this study now.
Background: In the present study used device jet plasma needle with atmospheric pressure which generates non thermal plasma jet to measure treatment potent with plasma against pathogenic bacteria founded in UTI was inactivated with plasma at 10 sec,
Objective:. This work included the application of the plasma produced from the system in the field of bacterial sterilization , where sample of Gram- negative bacteria (Escherichia coli) were exposed to intervals (1-10)second . Midstream Urine samples swabs were obtained from patients with urinary tract infections.
Type of the study: Cross -sectional study.
Methods: The work were used i
... Show More