Polymer composite materials were prepared by mixing epoxy resin with sand particles in three different grain size (150-300 ), (300-600 ) and (600- 1200) μm . The weight of epoxy was 15%, 20%, 25% and 30% of the total weight. Compression strength and flexural strength tests were carried out for the prepared samples .The percentages of epoxy resin at 20% wt and 25% wt showed best mechanical properties for all grain sizes .These percentages were adopted to fill the void between particles sand which have two different size ranges (150-600) μm and {(150-300) & (600-1200)} μm respectively to obtain more dense material. The results showed that the strength of polymer composite at 20% resin is higher than 25% resin. The sample which has maximum value for compression strength and flexural strength was reinforced with fibers (glass, polypropylene and alucobond waste) by weight 1% and 1.5% respectively of the weight of epoxy resin.
The Na Bop-Pu Sap Pb-Zn ore bodies represent a typical vein-type lead-zinc deposit situated in the Cho Don area and are currently being extracted for their lead and zinc resources. This deposit is characterized by its significant scale and quality and is considered one of the prominent lead-zinc deposits in the Cho Don area. Despite its significance, this deposit has not received adequate attention, resulting in limited knowledge of its geology, mineralization, and deposit genesis model. To address this knowledge gap, our study utilized several methodologies, including field surveying, ore mineral analysis under a microscope, and S and Pb isotopic geochemistry. By employing these approaches, we were able to obtain specific insights
... Show MoreThis study discusses the semiotic of the Islamic blazon - a related analytical study between the Islamic blazon and its visual publicity message. The aim of the current study is to explore the related relationship between the Islamic blazon and its visual publicity message. The sample is contained Five of Islamic blazon in the Mamelukes period which is between 1250 to 1517. The methodology is descriptive-analytical, and the result is that there is a clear relation between the Islamic blazon with its visual publicity message. This study's recommendation is to go towards analyzing the meanings of the cultural legacies of the Islamic civilization, and researching the implicit meanings accompanying these features leads to a deeper understand
... Show MorePhase change material (PCM) is considered as one of the most effective thermal energy storage (TES) systems to balance energy supply and demand. A key challenge in designing efficient PCM-based TES systems lies in the enhancement of heat transmission during phase transition. This study numerically examines the privilege of employing twisted-fin arrays inside a shell-and-tube latent heat storage unit to improve the solidification performance. The presence of twisted fins contributes to the dominating role of heat conduction by their curved shapes, which restricts the role of natural convection but largely aids the overall heat-transfer process during solidification. The heat-discharge
This study presents the findings of a 3D finite element modeling on the performance of a single pile under various slenderness ratios (25, 50, 75, 100). These percentages were assigned to cover the most commonly configuration used in such kind of piles. The effect of the soil condition (dry and saturated) on the pile response was also investigated. The pile was modeled as a linear elastic, the surrounded dry soil layers were simulated by adopting a modified Mohr-Coulomb model, and the saturated soil layers were simulated by the modified UBCSAND model. The soil-pile interaction was represented by interface elements with a reduction factor (R) of 0.6 in the loose sand layer and 0.7 in t
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh
... Show MoreCompression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet
... Show MoreThis study was conducted to determine the ability of water treatment system (Vortisand) to reduce some chemical and physical properties for tigris river raw water, It consisted of turbidity, electrical conductivity, pH, total hardness, calcium Hardness as well as temperature in order to determine the unit`s efficiency for reducing their concentration as compared to those in the water produced by some classical potable water projects (Dora and Wathba) in Baghdad. Samples were collected during the cold months (December 2016 and January 2017) and during the hot months (May and June 2017). The results showed that this system has the ability to reduce some properties such as turbidity, the values were 215NTU in raw water and decreased to NTU
... Show MoreSteps were taken to obtain the Kojic acid crystals from local fungal isolation A. flavus WJF81 by separating the fermentation products from the fungus mycelium from the production plant at the centrifuge at a speed of 5000 cycles for 10 minutes. The extraction was followed by ethyl acetate then supernatant concentrate by using rotary evaporator, and dried with heat oven 37ºC. Long, yellowish, pristine acid crystals were obtained that examined the optical microscope with a magnification force of 10x and 40x. The melting point of kojic acid was determined between 152.9-153.5 °C Results of the diagnosis of Kojic acid by applying High pressure liquid chromatography HPLC technique showed that the acid was at one peak, which was close to the
... Show MoreSuccess in selecting the best among the sources of supply is one of the most important factors in the efficiency of the procurement activity in the company, because the proper selection of the source of the supply significantly affect the achievement of what is desired by the factors of quality, quantity, price and service, and the ability of the competent supplier to meet everything associated with this Factors of commitments, hereby supporting the procurement function's efforts to fully discharge its responsibilities, and in view of adopting of Al-Furat company quality management system by applying the standards of ISO (9001: 2015) and purpose of getting the on-demand benefits from the application of international standards reg
... Show More