Many additives are used to improve the performance of cables in terms of increasing their flame retardancy, thermal stability, thermal conductivity, and other characteristics. Unfortunately, most of these additives contain heavy metals. Therefore, the main objective of this study is to introduce a material representing a new generation of environmentally friendly heavy metal-free stabilizers for cable grade poly(vinyl chloride) that can compete with traditional materials in terms of performance and distinctive properties. This unique additive is Oxydtron, a synthetic silicate or simply nanocement. The tests performed are rheological properties represented by a capillary rheometry analysis, limiting oxygen index, and volume resistivity. The most significant improvement in Bagley correction measurements was 14.61%; 18.13%; and 27.20% more than poly(vinyl chloride) basic formulation when using 5wt.% Oxydtron at 160 °C, 170 °C, and 180 °C, respectively. Also, the mean increases in relaxation time were 3.200 times, 8.825 times, and 12.458 times more than poly(vinyl chloride) basic formulation with 1wt.%, 3wt.%, and 5wt.% of Oxydtron, respectively. Furthermore, the Oxydtron lowered the value of the accompanying thermal gradient of the L.O.I test, reducing the heat-affected zone. The best result was with the extrusion processing method due to the uniformity of the processing conditions. However, the thermal gradient analysis showed residual heat stress in the test samples after cutting the burning layer and re-testing the samples again; this causes them to burn faster. This situation requires caution for designs that are exposed to high temperatures without burning. The optimum improvement in volume resistivity value was 14.71% and 38.24% more than poly(vinyl chloride) basic formulation after adding 5wt.% and 7wt.% of Oxydtron, respectively.
Films of pure Poly (methyl methacrylate) (PMMA) doped by potassium iodide (KI) salt with percentages (1%) at different thickness prepared by casting method at room temperature. In order to study the effect of increasing thickness on optical properties, transmission and absorption spectra have been record for five different thicknesses(80,140,210,250,320)µm. The study has been extended to include the changes in the band gap energies, refractive index, extinction coefficient and absorption coefficient with thickness.
The aim of this study was to determine the effect of different dietary fat on carcass traits in Japanese quail (Coturnix coturnix japonica). A total of 168 7-week-old Japanese quail (48 males and 120 females) were used in this study. They were evenly distributed into 4 treatment groups, with 3 replicates per group containing 4 males and 10 females each. The birds were fed a basal diet with different fats (sunflower, flax, corn, and fish oils) at a 3% level for 13 weeks. On the last day of the experiment, 12 birds were randomly selected from each treatment group (6 males and 6 females) and slaughtered to determine carcass characteristics included in this study, which were carcass weight, dressing percentage with or without giblets, and the r
... Show MoreMany consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s
... Show MoreIn this effort, we define a new class of fractional analytic functions containing functional parameters in the open unit disk. By employing this class, we introduce two types of fractional operators, differential and integral. The fractional differential operator is considered to be in the sense of Ruscheweyh differential operator, while the fractional integral operator is in the sense of Noor integral. The boundedness and compactness in a complex Banach space are discussed. Other studies are illustrated in the sequel.
This study describes the preparation of new series of tetra-dentate N2O2 dinuclear complexes (Cr3+, Co2+, Cu2+) of the Schiff base derived from condensation of 1-Hydroxy-naphthalene-2-carbaldehyde with 2-amino-5-(2-hydroxy-phenyl)-1,3,4-thiadiazole. The structures of the ligands were identified using IR, UV-Vis , mass, elemental analysis and 1H-NMR techniques. All prepared complexes have been characterized by conductance measurement, magnetic susceptibility, electronic spectra, infrared spectrum, theromgravimatric analysis (TGA) and metal analysis by atomic absorption. From stoichiometry of metal to ligand and all measurements show a octahedral geometry proposed for all
... Show MoreThis study describes the preparation of new series of tetra-dentate N2O2 dinuclear complexes (Cr3+, Co2+, Cu2+) of the Schiff base derived from condensation of 1-Hydroxy-naphthalene-2-carbaldehyde with 2-amino-5-(2-hydroxy-phenyl)-1,3,4-thiadiazole. The structures of the ligands were identified using IR, UV-Vis , mass, elemental analysis and 1H-NMR techniques. All prepared complexes have been characterized by conductance measurement, magnetic susceptibility, electronic spectra, infrared spectrum, theromgravimatric analysis (TGA) and metal analysis by atomic absorption. From stoichiometry of metal to ligand and all measurements show a octahedral geometry proposed for all complexes of the (Cr3+, Co2+, Cu2+). conductivity measurement shows t
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio
... Show MoreThe Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show More