Preferred Language
Articles
/
ijs-695
Study the Effect Some of Electrodeposition Parameters on Wear Resistance for Cu-MWCNT Composite Coating
...Show More Authors

A Copper- Mullet walled Carbon Nanotube Cu/MWCNT composite coatings prepared by direct and pulse electrodeposition with various contents of MWCNT particles, using electrodeposition method from acidic sulfate bath. The effect of the current density, pulse frequency and  particle loading (PL) of MWCNT particle in the electrolyte on the morphology and volume fraction Vol% of MWCNT in deposit were investigate. The experimental results indicated that the depositing condition affect on the microstructure of deposited copper and MWCNT Vol% in deposit. Also, the Vol% of MWCNT increases in deposit with particle loading (PL) increasing in the bath and increased with increased current density. Increasing MWCNTs in electrolyte produced increased microhardness values and increasing content MWCNT in the electrolyte resulted in decrease wear rate.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 08 1999
Journal Name
Abhath Al- Yarmouk [basic Sciences And Engineering]
Model for Predicting the Cracking Moment in Structural Concrete Members
...Show More Authors

Publication Date
Mon Dec 23 2024
Journal Name
University Of Kirkuk Journal For Administrative And Economic Science
Anova For Fuzzy Data With Practical in The Medical Field
...Show More Authors

This research study Blur groups (Fuzzy Sets) which is the perception of the most modern in the application in various practical and theoretical areas and in various fields of life, was addressed to the fuzzy random variable whose value is not real, but the numbers Millbh because it expresses the mysterious phenomena or uncertain with measurements are not assertive. Fuzzy data were presented for binocular test and analysis of variance method of random Fuzzy variables , where this method depends on a number of assumptions, which is a problem that prevents the use of this method in the case of non-realized.

View Publication Preview PDF
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
ECC Based Encryption for the Secured Proactive Network Forensic Framework
...Show More Authors

     Elliptic Curve Cryptography (ECC) is one of the public key cryptosystems that works based on the algebraic models in the form of elliptic curves. Usually, in ECC to implement the encryption, the encoding of data must be carried out on the elliptic curve, which seems to be a preprocessing step. Similarly, after the decryption a post processing step must be conducted for mapping or decoding the corresponding data to the exact point on the elliptic curves. The Memory Mapping (MM) and Koblitz Encoding (KE) are the commonly used encoding models. But both encoding models have drawbacks as the MM needs more memory for processing and the KE needs more computational resources. To overcome these issues the proposed enhanced Koblitz encodi

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Effective Computational Methods for Solving the Jeffery-Hamel Flow Problem
...Show More Authors

In this paper, the effective computational method (ECM) based on the standard monomial polynomial has been implemented to solve the nonlinear Jeffery-Hamel flow problem. Moreover, novel effective computational methods have been developed and suggested in this study by suitable base functions, namely Chebyshev, Bernstein, Legendre, and Hermite polynomials. The utilization of the base functions converts the nonlinear problem to a nonlinear algebraic system of equations, which is then resolved using the Mathematica®12 program. The development of effective computational methods (D-ECM) has been applied to solve the nonlinear Jeffery-Hamel flow problem, then a comparison between the methods has been shown. Furthermore, the maximum

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Results In Physics
An efficient iterative method for solving the Fokker–Planck equation
...Show More Authors

View Publication
Crossref (8)
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Explicit Finite Difference Approximation for the TwoDimensional Fractional Dispersion Equation
...Show More Authors

  In this paper, we introduce and discuss an algorithm for the numerical solution of two- dimensional fractional dispersion equation.  The algorithm for the numerical solution of this equation is based on explicit finite difference approximation. Consistency, conditional stability, and convergence of this numerical method are described. Finally, numerical example is presented to show the dispersion behavior according to the order of the fractional derivative and we demonstrate that our explicit finite difference approximation is a computationally efficient method for solving two-dimensional fractional dispersion equation

View Publication Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
design Electronic cost accounting system for the Iraqi Airways Company
...Show More Authors

The research Was based to on a real problem and realistically of represented by that  Iraqi Airways company does not have the electronic cost accounting system and therefore  be the process of  the pricing various services provided by a company sample research respecting  air transport and air cargo and aviation fuel and services and catering are not properly especially in the presence of new data from the new companies entering competition in Iraqi aviation industry and therefore does not provide price flexibility in order to compete in getting market share, And then research this problem addressed through design an electronic cost Accounting system covers all the costs incurred by the compan

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 03 2014
Journal Name
Hammurabi Journal For Studies
Israel and the Quest for Regional Instability (Egypt, Iraq, Syria)
...Show More Authors

Abstract: Israel formulated its security theory, which it established on the "pretext of war", meaning converting any Arab action that Israel deems a threat to its security, into a pretext to ignite the fuse of war, considering this a violation of an existing situation, and then it initiates preventive and pre-emptive attacks, then immediately turns into transfer the war to the enemy's land, to achieve a quick solution by (destroying the enemy), occupying its lands, and benefiting of the advantage of working on (internal lines against an enemy) working on external lines, and ending the war quickly, before the major powers intervene to impose a ceasefire

Preview PDF
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Statistical Model for Predicting the Optimum Gypsum Content in Concrete
...Show More Authors

The problem of internal sulfate attack in concrete is widespread in Iraq and neighboring countries.This is because of the high sulfate content usually present in sand and gravel used in it. In the present study the total effective sulfate in concrete was used to calculate the optimum SO3 content. Regression models were developed based on linear regression analysis to predict the optimum SO3 content usually referred as (O.G.C) in concrete. The data is separated to 155 for the development of the models and 37 for checking the models. Eight models were built for 28-days age. Then a late age (greater than 28-days) model was developed based on the predicted optimum SO3 content of 28-days and late age. Eight developed models were built for all

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 13 2023
Journal Name
Aip Conference Proceedings
Results for the (b,t)-blocking sets in PG(2,8)
...Show More Authors

View Publication
Scopus Crossref