Preferred Language
Articles
/
jih-57
Interactions Investigation of New Composite Material Formed from Bauxite and Melamine-Urea Formaldehyde Copolymer
...Show More Authors

In this study the Bauxite has been activated and used to prepare two complexes: Bauxite - urea and Bauxite - melamine, these complexes were merged and polymerized with formaldehyde to prepare the complex Bauxite polymer - urea - melamine - formaldehyde (modified Bauxite). In the Bauxite-urea complex XRD results indicate that the urea molecules penetrate among the layers of the crystal plane (110) of the Gibbsite mineral while in the Bauxite-melamine the interaction was at the outer surface of the Bauxite forming minerals because the relatively large volume of the melamine molecule. FT-IR results show the interaction of these two bases with Bauxite was mainly based on the hydrogen bonding and in less extent on the coordination between N loan pair atom and aluminum empty orbital in the above complexes. Finally the copolymer was formed around the micro-crystals of Bauxite minerals.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Petroleum Science And Engineering
Factors affecting gel strength design for conformance control: An integrated investigation
...Show More Authors

View Publication
Crossref (5)
Crossref
Publication Date
Thu Nov 01 2012
Journal Name
2012 First National Conference For Engineering Sciences (fnces 2012)
Laboratory investigation in the Hydrated lime effect on asphalt concrete mixture
...Show More Authors

This investigation was undertaken to evaluate the effectiveness of using Hydrated lime as a (partial substitute) by weight of filler (lime stone powder) with five consecutive percentage namely (1.0, 1.5, 2.0, 2.5, 3.0) % by means of aggregate treatment, by introducing dry lime on dry and 2–3% Saturated surface aggregate on both wearing and binder coarse. Marshall design method, indirect tensile test and permanent deformation under repeated loading of Pneumatic repeated load system at full range of temperature (20, 40, 60) C0 were examined The study revealed that the use of 2.0% and 1.5 % of dry and wet replacement extend the pavement characteristics by improving the Marshall properties and increasing the TSR%. Finally, increase permanent

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers
...Show More Authors

With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jun 03 2023
Journal Name
Iraqi Journal Of Science
Investigation of Giardia lamblia and other parasites in tap water as a potential source of transmission in some regions of Baghdad
...Show More Authors

Samples from tap water were chosen to be examined as one of the possible modes of G. lamblia and other parasites transmission. 144 domestic filter units were randomly distributed to houses in Baghdad in Al-Sadr City and surrounding regions then the suspended materials were examined microscopically by direct wet mount after centrifugal sedimentation method, and after staining with modified Ziehl-Neelsen (acid fast) stain. The results showed that 5/144 (3.47%) samples contained G. lamblia cysts, 3/144 (2.08%) contained E. histolytica/E. dispar cyst, while each of Cryptosporidium spp. and Cyclospora cayetanensis oocysts were observed in two samples (1.38%); also free living amoeba, ciliates and flagellates were detected in all samples. This

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Molecular Structure
A new thiazoldinone and triazole derivatives: Synthesis, characterization and liquid crystalline properties
...Show More Authors

View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Oct 20 2024
Journal Name
Engineering Reports
A Theoretical and Experimental Investigation of the Effects of Inverted Wings Modifications on the Stability and Aerodynamic Performance of a Sedan Car at Cornering
...Show More Authors
ABSTRACT<p>This research examines the impact of cornering on the aerodynamic forces and stability of a Nissan Versa (Almera) passenger sedan car by introducing novel modifications. These modifications included single inverted wings with end plates as a front spoiler, double‐element inverted wings with end plates as a rear spoiler, and incorporating the ground as a diffuser under the car trunk. The goal is to enhance the performance and stability of conventional passenger cars. To ensure the accuracy of the numerical data, the study utilized multiple methodologies to model the turbulence model, ultimately selecting the most suitable option. This involved comparing numerical data with wind tunnel experimental d</p> ... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Ain Shams University
New Studies for Topological Generalizations and Uncertainty in Graph Theory
...Show More Authors

Topology and its applications occupy the interest of many researching centers in the advanced world. From this point of view and because the near open sets play a very important role in general topology and they are now the research topics of many topologists worldwide and its sets doesn’t enter in fibrewise topology yet. Therefore, we use some of the near open sets to be model for introduce results and new spaces in fibrewise topological spaces. Also, there is a very important role of closure operators in constructing a topological spaces, so we introduce a new closure operators on the power set of vertices on graphs and conclusion theorems and new spaces from it. Furthermore, we discuss the relationships of connectedness between some ty

... Show More
Preview PDF
Publication Date
Thu Apr 13 2023
Journal Name
Corrosion And Protection
NEW THERMOTROPIC SYMMETRICAL MESOGENS CONTAINING HETERO RINGS: SYNTHESIS AND CHARACTERIZATION
...Show More Authors

A variety of liquid crystals comprising heterocyclics 1,3,4-oxadiazol ring [III], aminooxazol [IV]a, and aminothiazol [IV]b were synthesized through a number of steps, beginning of the reaction of 3, 3'- dimethyl - [1, 1'-biphenyl] -4, 4'- diamin, ethyl monochloroacetate and sodium acetate to synthesize diacetate compound[I]. The diester reacted with hydrazine hydrate(N2H4-H2O) to give dihydrazide compound [II], then reacted with Pyruvic acid and phosphorous oxychloride to produce diketone compound [III]. The last compound was reacted with urea and thiourea to give aminooxazol and aminothiazol respectively. The synthesized compounds actually characterized and determined the structures by melting points, FT-IR and 1H-NMR spectroscopies. By u

... Show More
Preview PDF
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
...Show More Authors

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (4)
Scopus Clarivate Crossref