Preferred Language
Articles
/
joe-2242
Numerical Simulation of Temperatures Distribution and Residual Stresses of High Melting Temperature Polymer
...Show More Authors

This work predicts the effect of thermal load distribution in polymer melt inside a mold and a die during injection and extrusion processes respectively on the structure properties of final product. Transient thermal and structure models of solidification process for polycarbonate polymer melt in a steel mold and die are studied in this research. Thermal solution obtained according to solidify the melt from 300 to 30Cand Biot number of 16 and 112 respectively for the mold and from 300 to 30 Cand Biot number of 16 for die. Thermal conductivity, and shear and Young Modulus of polycarbonate are temperature depending. Bonded contact between the polycarbonate and the steel surfaces is suggested to transfer the thermal load. The temperatures distribution produces in thermal model importing as load and boundary conditions to solve the structure model. 3D mold and die are built to simulate the thermal and structure behavior using ANSYS 12.1 program. The results show that the temperatures and residual stresses decreases with the distance from the center to surfaces for the mold ,while for the die the temperatures and stresses decreases with the distance from the inlet to the outlet. The temperatures and stresses decreases with the time increasing for both mold and die. Also the thermal strain compatible with the temperatures distribution in the mold and the die. The total deformation concentrated at the left and right edge of polycarbonate in the mold, while starting in the center of the polymer at the outlet and then transfer to the entry of the die with the time increasing.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On e-Small Submodules
...Show More Authors

Let M be an R-module, where R is a commutative ring with unity. A submodule N of M is called e-small (denoted by N e  M) if N + K = M, where K e  M implies K = M. We give many properties related with this type of submodules.

View Publication Preview PDF
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Some Results on Pure Submodules Relative to Submodule
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be pure relative to submodule T of M (Simply T-pure) if for each ideal A of R, N?AM=AN+T?(N?AM). In this paper, the properties of the following concepts were studied: Pure essential submodules relative to submodule T of M (Simply T-pure essential),Pure closed submodules relative to submodule T of M (Simply T-pure closed) and relative pure complement submodule relative to submodule T of M (Simply T-pure complement) and T-purely extending. We prove that; Let M be a T-purely extending module and let N be a T-pure submodule of M. If M has the T-PIP, then N is T-purely extending.

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Performance Improvement for Wireless Sensor Networks
...Show More Authors

In this paper, we prove that our proposed localization algorithm named Improved
Accuracy Distribution localization for wireless sensor networks (IADLoc) [1] is the
best when it is compared with the other localization algorithms by introducing many
cases of studies. The IADLoc is used to minimize the error rate of localization
without any additional cost and minimum energy consumption and also
decentralized implementation. The IADLoc is a range free and also range based
localization algorithm that uses both type of antenna (directional and omnidirectional)
it allows sensors to determine their location based on the region of
intersection (ROI) when the beacon nodes send the information to the sink node and
the la

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 30 2016
Journal Name
Al-kindy College Medical Journal
Deep Vein Thrombosis Predisposing Factors Analysis Using Association Rules Mining
...Show More Authors

Background: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
Recycled Concrete Aggregated for the use in Roller Compacted Concrete: A Literature Review
...Show More Authors

The using of recycled aggregates from construction and demolition waste (CDW) can preserve natural aggregate resources, reduce the demand for landfill, and contribute to a sustainable built environment. Concrete demolition waste has been proven to be an excellent source of aggregates for new concrete production. At a technical, economic, and environmental level, roller compacted concrete (RCC) applications benefit various civil construction projects. Roller Compacted Concrete (RCC) is a homogenous mixture that is best described as a zero-slump concrete placed with compacting equipment, uses in storage areas, dams, and most often as a basis for rigid pavements. The mix must be sufficiently dry to support

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Performance Improvement for Wireless Sensor Networks
...Show More Authors

In this paper, we prove that our proposed localization algorithm named Improved
Accuracy Distribution localization for wireless sensor networks (IADLoc) [1] is the
best when it is compared with the other localization algorithms by introducing many
cases of studies. The IADLoc is used to minimize the error rate of localization
without any additional cost and minimum energy consumption and also
decentralized implementation. The IADLoc is a range free and also range based
localization algorithm that uses both type of antenna (directional and omnidirectional)
it allows sensors to determine their location based on the region of
intersection (ROI) when the beacon nodes send the information to the sink node and
the la

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Iraqi Journal Of Science
On Semiannahilator Supplement Submodules
...Show More Authors

Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes

Publication Date
Thu May 04 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Generalized Regular Continuous Functions In Topological Spaces
...Show More Authors

In this paper we introduce a new type of functions called the generalized regular
continuous functions .These functions are weaker than regular continuous functions and
stronger than regular generalized continuous functions. Also, we study some
characterizations and basic properties of generalized regular continuous functions .Moreover
we study another types of generalized regular continuous functions and study the relation
among them

View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Energy Calculation for Excited Lithium Atom in Position Space
...Show More Authors

The energy expectation values for Li and Li-like ions ( , and ) have been calculated and examined within the ground state and the excited state in position space. The partitioning technique of Hartree-Fock (H-F) has been used for existing wave functions.

View Publication Preview PDF
Crossref