Pumpkin waste powder was used as a coloring and strengthening filler in epoxy to prepare a natural gelcoat . The Pumpkin powder was mixed with different weight ratios (1, 2, 3, 4, 5, 6, 7, and 8%) to the epoxy matrix to select the best value of powder addition. The effect of the pumpkin particle size on the mechanical properties (impact, flexural, hardness, and wear loss) using two different sizes (2.5 and 1.25 microns) was studied. The impact strength increased from (10.09 KJ/ m2) for neat epoxy to (14.79 KJ/ m2) for epoxy with 1% of micron pumpkin fibers ( MPF) with particle size 2.5 micrometer and (14.21 KJ/ m2) for epoxy with 4% (1.25 MPF), flexural strength increased from (41.94 MPa) for neat epoxy to (~ 46 MPa) for epoxy with 1% of 2.5 MPF and to (50.17 MPa) for epoxy with 4% of 1.25 MPF, hardness of neat epoxy was (~ 77) and almost maintained its value for epoxy with 1% of 2.5 MPF and for epoxy with 4% of 1.25 MPF. At almost the weight fractions addition of pumpkin fibers to epoxy, the (EP/1.25MPF) composite shows a higher wear resistance than the (EP/2.5MPF) composite. The density, thermal conductivity, and water diffusion (for 1-4 weeks' immersion) of (EP/2.5MPF) and (EP/1.25MPF) composites were carried out at different weight percentages of pumpkin fibers. SEM and EDS techniques were employed to fix the microstructure and the elemental composition of (EP/2.5MPF) and (EP/1.25MPF) composites, respectively. The internal structure of the composites has been linked with their macroscopic characteristics, such as the color degree of natural gelcoats and their mechanical and thermal properties.
The present work aimed to synthesize new phenol resins via incorporation of structural modification through introducing new phenolic compounds containing cyclic imide moiety in reaction with formaldehyde. The synthesis of these new resins involved three steps. First, one of the three N-(hydroxyphenyl)tetrabromophtalamic acids 1-3 were processed via a reaction between tetrabromophthalic anhydride and aminophenols. Amic acids 1-3 were dehydrated in the second step by smelting, producing the identical N-(hydroxyphenyl)tetrabromophthalimides 4-6. The new imides represent the new phenolic component
... Show MoreBackground: Surgery is one and may be the most effective method to treat obesity. In the last decade, Laparoscopic Sleeve Gastrectomy is perceived to be less invasive, technically simple, less morbid and more popular form of bariatric surgery.
Objectives: This study aims to assess the effect of Laparoscopic Sleeve Gastrectomy on Fasting Blood Glucose Levels and Blood Pressure.
Methods: A prospective controlled study in which 50 obese patients were involved, 36 of patients have hypertension and type 2 diabetes mellitus , 7 patients have type 2 diabetes mellitus only, and 7 patients don’t have hypertension or type 2 diabetes. All patients were submitted to Laparosco
... Show MoreBackground: Gastroesophageal reflux disease can lead to esophageal complications, including esophagitis, ulceration, stricture, hemorrhage, and Barrett’s esophagus. However, the spectrum of problems associated with GERD has expanded to extra esophageal sites. Chronic cough and asthma are two clinical problems caused or triggered by GERD. Spirometric changes among GERD associated cough and asthma still a topic of ongoing research.
Objectives: This study was designated to evaluate the spirometric picture of GERD associated cough and asthma subjects in relation to different clinical aspects of the disease including body mass index (BMI), disease duration, presence or absence of symptoms as well as endoscop
The environment in Mosul city is very rich, containing a wide variety of microorganisms which have not been recognised for a long time. Five new fungal genes were identified and registered for the first time in the gene bank. These included Fusarium falciforme 2020-06-MIK-F1 genes for 5.8S rRNA with Accession no. LC555741, Nectriaceae sp. 2020-06-MIK-F2 genes for ITS1 with Accession no. LC555742, Trichoderma asperellum MIK3 genes for 5.8S rRNA with Accession no. LC575020, Penecillum sp. MIK4 genes for 5.8S rRNA with Accession no. LC575021, and Neurospora crassa MIK5 genes for 5.8S rRNA with Accession no. LC575022. These fungal genes were isolated from wastewater of Khosr river in Mosul city/ Iraq, whi
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreDrilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.
In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show More