Many additives are used to improve the performance of cables in terms of increasing their flame retardancy, thermal stability, thermal conductivity, and other characteristics. Unfortunately, most of these additives contain heavy metals. Therefore, the main objective of this study is to introduce a material representing a new generation of environmentally friendly heavy metal-free stabilizers for cable grade poly(vinyl chloride) that can compete with traditional materials in terms of performance and distinctive properties. This unique additive is Oxydtron, a synthetic silicate or simply nanocement. The tests performed are rheological properties represented by a capillary rheometry analysis, limiting oxygen index, and volume resistivity. The most significant improvement in Bagley correction measurements was 14.61%; 18.13%; and 27.20% more than poly(vinyl chloride) basic formulation when using 5wt.% Oxydtron at 160 °C, 170 °C, and 180 °C, respectively. Also, the mean increases in relaxation time were 3.200 times, 8.825 times, and 12.458 times more than poly(vinyl chloride) basic formulation with 1wt.%, 3wt.%, and 5wt.% of Oxydtron, respectively. Furthermore, the Oxydtron lowered the value of the accompanying thermal gradient of the L.O.I test, reducing the heat-affected zone. The best result was with the extrusion processing method due to the uniformity of the processing conditions. However, the thermal gradient analysis showed residual heat stress in the test samples after cutting the burning layer and re-testing the samples again; this causes them to burn faster. This situation requires caution for designs that are exposed to high temperatures without burning. The optimum improvement in volume resistivity value was 14.71% and 38.24% more than poly(vinyl chloride) basic formulation after adding 5wt.% and 7wt.% of Oxydtron, respectively.
Feasibility of biosorbent of England bamboo plant origin was tested for removal of priority metal ions such as Cu and Zn from aqueous solutions in single metal state. Batch single metal state experiments were performed to determine the effect of dosage (0.5, 1 and 1.5 g), pH (3, 4, 4.5, 5 and 6), mixing speed (90, 111, 131, 156 and 170 rpm), temperature (20, 25, 30 and 35 °C) and metal ion concentration (10, 50, 70, 90 and 100 mg/L) on the ability of dried biomass to remove metal from solutions which were investigated. Dried powder of bamboo removed (for single metal state) about 74 % Cu and 69% Zn and maximum uptake of Cu and Zn was 7.39 mg/g and 6.96 mg/g respectively, from 100 mg/L of synthetic metal solution in 120 min. of contact t
... Show MoreNumerical study has been conducted to investigate the thermal performance enhancement of flat plate solar water collector by integrating the solar collector with metal foam blocks.The flow is assumed to be steady, incompressible and two dimensional in an inclined channel. The channel is provided with eight foam blocks manufactured form copper. The Brinkman-Forchheimer extended Darcy model is utilized to simulate the flow in the porous medium and the Navier-Stokes equation in the fluid region. The energy equation is used with local thermal equilibrium (LTE) assumption to simulate the thermofield inside the porous medium. The current investigation covers a range of solar radiation intensity at 09:00 AM, 12:00 PM, and 04:00
... Show MoreA recent study compared experimentally the hydraulic and thermal activity of twisted tape inserts for two types, metal foam twisted tape (MFTT) and traditional twisted tape (TTT), in a double pipe heat exchanger. The investigation goal of the innovatively designed MFTT is to enhance the heat transfer process, which provides a higher thermal enhancement factor over those of TTT under the same conditions. Heat transfer activity in terms of Nusselt number (
The internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio
... Show MoreThe Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show Morefashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This paper deals with constructing mixed probability distribution from mixing exponential
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show More