Many additives are used to improve the performance of cables in terms of increasing their flame retardancy, thermal stability, thermal conductivity, and other characteristics. Unfortunately, most of these additives contain heavy metals. Therefore, the main objective of this study is to introduce a material representing a new generation of environmentally friendly heavy metal-free stabilizers for cable grade poly(vinyl chloride) that can compete with traditional materials in terms of performance and distinctive properties. This unique additive is Oxydtron, a synthetic silicate or simply nanocement. The tests performed are rheological properties represented by a capillary rheometry analysis, limiting oxygen index, and volume resistivity. The most significant improvement in Bagley correction measurements was 14.61%; 18.13%; and 27.20% more than poly(vinyl chloride) basic formulation when using 5wt.% Oxydtron at 160 °C, 170 °C, and 180 °C, respectively. Also, the mean increases in relaxation time were 3.200 times, 8.825 times, and 12.458 times more than poly(vinyl chloride) basic formulation with 1wt.%, 3wt.%, and 5wt.% of Oxydtron, respectively. Furthermore, the Oxydtron lowered the value of the accompanying thermal gradient of the L.O.I test, reducing the heat-affected zone. The best result was with the extrusion processing method due to the uniformity of the processing conditions. However, the thermal gradient analysis showed residual heat stress in the test samples after cutting the burning layer and re-testing the samples again; this causes them to burn faster. This situation requires caution for designs that are exposed to high temperatures without burning. The optimum improvement in volume resistivity value was 14.71% and 38.24% more than poly(vinyl chloride) basic formulation after adding 5wt.% and 7wt.% of Oxydtron, respectively.
In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreThe topic of context is one of the important topics, which was mentioned as a concept in several fields and different fields, and there were many points of view that defined that concept.
He specified the title of the research (design contexts in the design of the interior space), as the research sought to identify the concept of context in the interior design of the spaces of sewing workshops. The research was divided into four chapters:
The first chapter, which consists of the methodological framework, the problem of research and the need for it, the importance of research, the goal and limits of research for sewing workshops for vocational schools from (2020-2021).
The second chapter: consists of previous studies and the theo
The right to property is one of the most fundamental rights enjoyed by individuals, and most national constitutions and laws, as well as international conventions, have to be respected and protected only in accordance with the economic and social development of the country (the so-called public benefit) and in return for just compensation. What is fair compensation?
The concept of decolonization of trauma has intrigued researchers for years due to its prolonged effect on personal and cultural levels. The process of intellectual decolonization involves defensive survival mechanisms, such as cultural rituals using traditional practices, nostalgic dialogues that idealize memories and recollections, and conversations about identity to navigate postcolonial trauma displacement. Symbolic connections evoke strong emotional responses, bridging the gap between the characters‘ physical dislocation and their imaginary homeland. Cocooning identity represents a space where a multidimensional self emerges—one that holds the victim of trauma, the survivor who endures, and the narrator, who constructs an idealized
... Show MoreBackground: Nursing interventions tailored to the smoking triggers in patients with non-communicable chronic diseases are essential. However, these interventions are scant due to the nature of factors associated with smoking cessation and the poor understanding of the effect of nurse-led intervention in Iraq.Purpose: This study aimed to determine the dominant smoking triggers and examine the effects of a tailored nursing intervention on smoking behavior in patients with non-communicable chronic diseases.Methods: Convenience samples of 128 patients with non-communicable chronic diseases, male and female patients, who were 18-70 years old, were recruited in this quasi-experimental, randomized comparative trial in the outpatient clinic
... Show MoreAbstract
The research aims to build a training program to develop some executive functions for kindergarten children. To achieve this goal, the two researchers built the program according to the following steps:
1. Determining the general objective of the program.
2. Determining the behavioral objectives of the program.
3. Determining the included content in the program.
4. Implementing the content of the activities of the program.
5. Evaluating the Program.
The program included (12) training activities, the training activities included several items: the title of the activity, the time of implementation of the activity, the general objective of the activity, the procedural behavioral objective, the means and tools u
This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreSince the law is the tool for implementing the state’s public policies, it is natural that its provisions (or at least some of them) seek to preserve human dignity as the source on which all rights and freedoms are based. One of the examples of humanizing the provisions of the law in France is what is known as the winter truce. What is this truce, what are the justifications for granting it, what is its historical origin, how did the legislative treatment of it develop, what are the similarities and differences between it and other legal periods included in French law, what is the scope of its application, and what are the effects resulting from it. These questions and others are what we will try to answer through this research.
Compassion competence is a nurse's ability to provide patient-centered care and communicate with patients in a sensitive and insightful manner. This descriptive cross-sectional survey study aimed to assess the compassion competence of a multinational group of nursing students.
A total of 1,158 undergraduate nursing students participated in this study, and stratified random sampling method was used to select participants from the 100 study level to the 400 or 500 level. Data were collected using the Compassion Competence Scale.
<The migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show More