Preferred Language
Articles
/
jih-1083
Study the Electromechanical Strength Properties for Epoxy Dispersed Silica Powder Composite
...Show More Authors

  Powder Silica (SiO2) was added to epoxy polymer with different weight percentages  (3.75,7.5,11.25 and 15 wt%) for particle size ï‚£ 63 µm. Hand lay-up method it is used to prepared (Epoxy-Silica) composite, and cutting appropriate specimens for testing. Electrical strength varies nonlinearly with specimens thickness, also decreasing with average time for the rise of voltage decreases due to electro thermal effects. Clearly, electrical strength decreases with the increase of the proportion of added silica. The hardness, tensile strength and young modulus increased with the added silica increases due to changing in material characteristics from ductility to brittle. Microscopic cracks and irregularity deformation were appeared within electrical breakdown area, especially for high silica additives. While, fusion, perforation and regularity of electrical breakdown area were appeared for specimens with low and without silica additives

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
2020 2nd Annual International Conference On Information And Sciences (aicis)
An Enhanced Multi-Objective Evolutionary Algorithm with Decomposition for Signed Community Detection Problem
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Batch and flow injection spectrophotometric methods for determination of Ceftazidime in pharmaceutical formulations
...Show More Authors

It is generally accepted that there are two spectrophotometric techniques for quantifying ceftazidime (CFT) in bulk medications and pharmaceutical formulations.  The methods  are described as simple, sensitive, selective, accurate and efficient techniques. The first method used an alkaline medium to convert ceftazidime to its diazonium salt, which is then combined with the 1-Naphthol (1-NPT) and 2-Naphthol (2-NPT) reagents. The azo dye that was produced brown  and red in color with absorption intensities of ƛmax 585 and 545nm respectively. Beer's law was followed in terms of concentration ranging from  (3-40) µg .ml-1 For (CFT-1-NPT) and (CFT-2-NPT), the detection limits were 1.0096 and 0.8017 µg.ml-1, respec

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jul 24 2020
Journal Name
Al-kindy College Medical Journal
Comorbidity and Risk Factors for COVID-19 Confirmed Patients in Wasit Province, IRAQ
...Show More Authors

Background: Coronavirus disease 2019 (COVID-19) is
one of the updated challenges facing the whole world.
Objective: To identify the characteristics risk factors that
present in humans to be more liable to get an infection
than others.
Methods: A cross-sectional study was conducted for
positively confirmed 35 patients with polymerase chain
reaction in Wasit province at AL-Zahraa Teaching
Hospital from the period of March 13th till April 20th. All
of them full a questionnaire regarded by risk factors and
other comorbidities. Data were analyzed by SPSS version
23 using frequency tables and percentage. For numerical
data, the median, and interquartile range (IQR) were used.
Differences between categoric

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Compare Linear Progamming With Other Methods to Finding Optimal Solution for Transportation Problem
...Show More Authors

The researcher studied transportation problem because it's great importance in the country's economy. This paper which ware studied several ways to find a solution closely to the optimization, has applied these methods to the practical reality by taking one oil derivatives which is benzene product, where the first purpose of this study is, how we can reduce the total costs of transportation for product of petrol from warehouses in the province of Baghdad, to some stations in the Karsh district and Rusafa in the same province. Secondly, how can we address the Domandes of each station by required quantity which is depending on absorptive capacity of the warehouses (quantities supply), And through r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 26 2019
Journal Name
Iraqi Journal Of Science
Bayesian Estimation for Two Parameters of Gamma Distribution under Generalized Weighted Loss Function
...Show More Authors

This paper deals with, Bayesian estimation of the parameters of Gamma distribution under Generalized Weighted loss function, based on Gamma and Exponential priors for the shape and scale parameters, respectively. Moment, Maximum likelihood estimators and Lindley’s approximation have been used effectively in Bayesian estimation. Based on Monte Carlo simulation method, those estimators are compared in terms of the mean squared errors (MSE’s).

Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Intelligent Systems
Void-hole aware and reliable data forwarding strategy for underwater wireless sensor networks
...Show More Authors
Abstract<p>Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co</p> ... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Mon Mar 15 2004
Journal Name
Sciences Journal Of Physical Education
Setting standard levels for some offensive skill abilities according to basketball playing positions
...Show More Authors

لا يزال المهتمون بلعبة كرة السلة يبحثون عن إيجاد الوسائل الأكثر أهمية وصولاً إلى ما تطمح إليه الدول لتحقيق افضل المستويات في نواحي اللعبة كافة من خلال التغلب على المعوقات التي تحول دون تقدمها إلى الأمام بالدراسة والبحث. ومن هذا المنطلق انصب البحث في ضرورة معالجة القصور الناتج عن عدم وجود المستويات المعيارية ذات العلاقة باختبارات قدرات اللاعبين وعلى وفق مراكز اللعب ولا سيما المهارية الهجومية، ومما شكل ذلك ضع

... Show More
Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Application of SWAT Model for Sediment Loads from Valleys Transmitted to Haditha Reservoir
...Show More Authors

This study included the extraction properties of spatial and morphological basins studied using the Soil and Water Assessment Tool (SWAT) model linked to (GIS) to find the amount of sediment and rates of flow that flows into the Haditha reservoir . The aim of this study is determine the amount of sediment coming from the valleys and flowing into the Haditha Dam reservoir for 25 years ago for the period (1985-2010) and its impact on design lifetime of the Haditha Dam reservoir and to determine the best ways to reduce the sediment transport. The result indicated that total amount of sediment coming from all valleys about (2.56 * 106 ton). The maximum annual total sediment load was about (488.22 * 103 ton) in year 1988

... Show More
View Publication Preview PDF