Preferred Language
Articles
/
joe-713
Effect of bentonite addition on some properties of porcelain
...Show More Authors

Porcelain is one of the most important ceramic materials with a wide range of traditional and technical applications. Since most mixtures of porcelain have a high sintering temperature, bentonite has been added in this research to improve the characteristics of sintering and burning. The porcelain mixture consisted of the following Iraqi raw materials: 30% wt kaolin, 30 wt% non-plastic clay (grog), 10% wt sodium feldspar, 10 wt% potassium feldspar and 20 wt% flint. After the mechanical mixing process and transfer the powder mixture to the slurry by adding distilled water, then different weight percentage of the sodium bentonite(0, 2.5, 5, 7.5 and 10) wt% was added. The specimens were prepared by using the solid casting method, and after the drying process, the specimens were burned at1100 oC. The results of x-ray diffraction showed that bentonite reduced the crystallization of the main ceramic phases (mullite, quartz), which stimulates the appearance of amorphous glass phases. Also, the loss of mass on ignition increased when the addition of bentonite from 5.66% to 8.2%. There was also a great convergence between the granules of porcelain when adding bentonite and thus increase the shrinkage of the dimensions from 9.33% to 12.37 %. This led to increasing the bulk density from 1.97 g/cm3 to 2.67 g/cm3 at firing temperature 1100oC, and the porosity was decreased from 17.1% to 1.44%. Diametrical strength and flexural strength (bending) increased with bentonite (14.88 to 34.46MPa), (6.2 to 8.65 MPa), respectively.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 17 2022
Journal Name
Journal Of The College Of Languages (jcl)
The Use of the Definite article in the Ottoman Turkish Language in the Fourteenth and Seventeenth Centuries: Qaboos Namah and Mazaki Collection as a Model: '' Kabusnâme ve Mezâkî Divanı Örneğinde ''14. ve 17. Yüzyılarda Osmanlı Türkçesinde Harf-i Ta'rifin Kullanması Üzerine Bir İnceleme
...Show More Authors

The Turks used the Ottoman Turkish language from the thirteenth century to the twentieth century.  During this period and under the influence of Islamic civilization, a large number of words and structures were used from the Arabic and Persian languages, Therefore, many Arabic grammatical structures were used in the Ottoman Turkish language, such as the definite article simply because it was widely used.

The paper is concerned with the use of the Arabic definite article in the Ottoman Turkish language, and the aim of this contrastive study is to find out the similarities and differences between the two languages ​​in terms of meaning and structure. Since linguistic studies depend on the practical side or applied approach, two

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
The Broken Wings: The character of the Arab Christian |Woman in Sami Michael's Novel "Trumpet in the Wadi" versus "Jasmine" by Eli Amir: הכנפיים שנשברו דמות האישה הערבית הנוצרית ברומן " חוצוצרה בוואדי " של סמי מיכאל לעומת דמותה ב " יסמין " של אלי עמיר
...Show More Authors

Sami Michael and Eli Amir - two Israeli writers born in Iraq and of the same generation (Sami Makhail was born in Baghdad in 1926 and Eli Amir in 1937). They wrote in their novels, among other things, about Orientalism , love and femininity. They both lived wild, extroverted lives. They did not shy away from experiencing anything new that came their way, rebelled against conventions and acted provocatively; they enjoyed the shock and amazement that evoked around them. While trying to find their place in different family settings, they chose to present two Arab Christian heroines. The narrator in Jasmine is the speaker Noori-Eli himself. While the narrator of “Trumpet in the Wadi” is Huda the heroine herself. Both ar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 07 2016
Journal Name
International Journal Of Science And Research
Synthesis, Characterization and Antimicrobial Activity Studies of Mixed-1,10-phenanthroline- Mn(II),Co(II), Cu(II), Ni(II) and Hg(II) Complexes with Schiff Base[2,2'-(1Z,1'Z)-(biphenyl-4,4'- diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1- ylidene)diphenol]
...Show More Authors

Abstract: The M(II) complexes [M2(phen)2(L)(H2O)2Cl2] in (2:1:2 (M:L:phen) molar ratio, (where M(II) =Mn(II), Co(II), Cu(II), Ni(II) and Hg(II), phen = 1,10-phenanthroline; L = 2,2'-(1Z,1'Z)-(biphenyl-4,4'-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1- ylidene)diphenol] were synthesized. The mixed complexes have been prepared and characterized using 1H and13C NMR, UV/Visible, FTIR spectra methods and elemental microanalysis, as well as magnetic susceptibility and conductivity measurements. The metal complexes were tested in vitro against three types of pathogenic bacteria microorganisms: Staphylococcus aurous, Escherichia coli, Bacillussubtilis and Pseudomonasaeroginosa to assess their antimicrobial properties. From this study shows that a

... Show More
Preview PDF
Publication Date
Thu Jun 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Minimally invasive access cavities in endodontics
...Show More Authors

Background: The access cavity is a critical stage in root canal therapy and it may influence the subsequent steps of the treatment. The new minimally invasive endodontic access cavity preparation concept aims to preserve sound tooth structure by conserving as much intact dentine as possible including the pulp chamber's roof, to keep the teeth from fracturing during and after endodontic treatment. While there is great interest in such access opening designs in numerous publications, still there is a lack of scientific evidence to support the application of such modern access cavity designs in clinical practice. This review aims to critically examine the literature on minimal access cavity preparations, explain the effect of minimally inva

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of The College Of Languages (jcl)
An Analytical Study of Viewpoint in Parsi Pour's and Ar-Rikabi's Novels: The Dog and the Long Night and Alibaba's Sad Night as Examples: بررسی تحليلی زاویه¬ی دید در رمان¬های پارسی پور و الرکابی باتكيه بر رمان "سگ و زمستان بلند" و "ليل علی بابا الحزین"
...Show More Authors

It is noted in the title that the paper studies the viewpoint in the novel The Dog and the Long Night by the Iranian novelist Shahranoush Parsi Pour and in the novel Alibaba's Sad Night by the Iraqi novelist Abdulkhaliq Ar-Rikabi. Both are well known novelists, and about whose stories and novels many critical books, MA theses, and Ph.D. dissertations have been written. Also, some of their literary works have won prizes. Here, the researcher shed light on the concept of viewpoint, its types, and its importance in novels in general. This was done along with tackling the two viewpoints in both novels, where similarities and differences were identified. For this end, the researcher has adopted the analytic-descriptive appro

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 23 2019
Journal Name
Arma
Safe Mud Weight Window Determination: A Case Study from Southern Iraq
...Show More Authors

ABSTRACT:. The Lower Cretaceous Zubair formation is comprised of sandstones intercalated with shale sequences. The main challenges that were encountered while drilling into this formation included severe wellbore instability-related issues across the weaker formations overlaying the reservoir section (pay zone). These issues have a significant impact on well costs and timeline. In this paper, a comprehensive geomechanical study was carried out to understand the causes of the wellbore failure and to improve drilling design and drilling performance on further development wells in the field. Failure criteria known as Mogi-Coulomb was used to determine an operating mud weight window required for safe drilling. The accuracy of the geomechanical

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 30 2018
Journal Name
Journal Of Engineering
Statistical Equations to Estimate the In-situ Concrete Compressive Strength from Non-destructive Tests
...Show More Authors

The aim of this study is to propose reliable equations to estimate the in-situ concrete compressive strength from the non-destructive test. Three equations were proposed: the first equation considers the number of rebound hummer only, the second equation consider the ultrasonic pulse velocity only, and the third equation combines the number of rebound hummer and the ultrasonic pulse velocity. The proposed equations were derived from non-linear regression analysis and they were calibrated with the test results of 372 concrete specimens compiled from the literature. The performance of the proposed equations was tested by comparing their strength estimations with those of related existing equations from literature. Comparis

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Mobile position estimation using artificial neural network in CDMA cellular systems
...Show More Authors

Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The result

... Show More
Publication Date
Sun Jun 23 2019
Journal Name
American Rock Mechanics Association
Using an Analytical Model to Predict Collapse Volume During Drilling: A Case Study from Southern Iraq
...Show More Authors

Zubair Formation is one of the richest petroleum systems in Southern Iraq. This formation is composed mainly of sandstones interbedded with shale sequences, with minor streaks of limestone and siltstone. Borehole collapse is one of the most critical challenges that continuously appear in drilling and production operations. Problems associated with borehole collapse, such as tight hole while tripping, stuck pipe and logging tools, hole enlargement, poor log quality, and poor primary cement jobs, are the cause of the majority of the nonproductive time (NPT) in the Zubair reservoir developments. Several studies released models predicting the onset of borehole collapse and the amount of enlargement of the wellbore cross-section. However, assump

... Show More
View Publication