In this work Different weight of pure Zinc powder suspended particles in 4ml base engine Oil were used.
Intensity of Kα Line was measured for the suspended particles ,also for mixture which consist from Zinc particle blended with Engine base Oil. Calibration Curve was drawn between Ikα line Intensity and Zinc concentration at different operation condition. The Lower Limit detection (LLD) and Sensitivity (m) of Spectrometer were determined for different Zinc Concentration (Wt%). The results of LLD and m for Samples were analyzed at Operation Condition of 30KV,17mA is best from Samples were analyzed at Operation Condition of 25KV,15mA
The development of the perforated fin had proposed in many studies to enhance the heat transfer from electronic pieces. This paper presents a novel derivative method to find the temperature distribution of the new design (inclined perforated) of the pin fin. Perforated with rectangular section and different angles of inclination was considered. Signum Function is used for modeling the variable heat transfer area. Set of parameters to handle the conduction and convection area were calculated. Degenerate Hypergeometric Equation (DHE) was used for modeling the Complex energy differential equation and then solved by Kummer’s series. In the validation process, Ansys 16.0-Steady State Thermal was used. Two geometric models were consider
... Show MoreBobbin friction stir welding (BFSW) is a variant of the conventional friction stir welding (CFSW); it can weld the upper and lower surface of the work-piece in the same pass. This technique involves the bonding of materials without melting. In this work, the influence of tool design on the mechanical properties of welding joints of 6061-T6 aluminum alloy with 6.25 mm thickness produced by FSW bobbin tools was investigated and the best bobbin tool design was determined. Five different probe shapes (threaded straight cylindrical, straight cylindrical with 3 flat surfaces, straight cylindrical with 4 flat surfaces, threaded straight cylindrical with 3 flat surface and threaded straight cylindrical with 4 flat surfaces) with various dimensio
... Show MoreThis study aims at suggesting flow as a strategy for training female EFL student-teachers in the teaching training course and finding out the effect of this strategy on their performance and their flow state. The training course syllabuses will be constructed according to the flow nine factors and the teaching skills. The measurement tools are the student-teacher performance checklist that has already been used by the department of English language and SHORT Flow State Scale (S FSS-2). The study population is represented with the (60) female student-teachers/ fourth stage/ evening studies at theEnglish department /college of education for women/the University of Baghdad. The study is used the experimental design in that (30) of the student-
... Show MorePurpose To test the effect of strategic Supremacy on strategic success A case study in Thi Qar Governorate, methodology/approach – this is a mandatory entry.
a case study was used and applied to the Department managers of Government of the province of Thi Qar, Research limitations/implications – It is clear that the strategic Supremacy variable is not being used effectively to achieve strategic success.
Practical implications – use strategic supremacy positively to Support for strategic success. implementing and monitoring ignorance of them in how to use thi
... Show MoreThe plant licorice is considered important plants as nutritionally and medically and economically, as a rich in phytochemical, vitamins and minerals, and being widely available, Research indicated the presence of many nutrients such as (proteins, Carbohydrates, vitamins and minerals) as well as presence of Glycyrrhizin which responsible of sweet taste, that allowing the possibility to use it as natural intensity sweetener with few calories in Sweetening of many food. This research is aimed to study the Stability of Glycyrrhizin toward the various manufacturing conditions such as (thermal treatment, pH of foods and microwaves), so three factorial experiments was implemented to find out the Stability as following: 100C° - 121C° - Microwa
... Show MorePV connected systems are worldwide installed because it allows consumer to reduce energy consumption from the electricity grid. This paper presents the results obtained from monitoring a 1.1 kWp. The system was monitored for nine months and all the electricity generated was fed to the fifth floor for physics and renewable energy building 220 V, 50 Hz. Monthly, and daily performance parameters of the PV system are evaluated which include: average generated of system Ah per day, average system efficiency, solar irradiation around these months. The average generated kWh per day was 8 kWh/day, the average solar irradiation per day was 5.6 kWh/m2/day, the average inverter efficiency was 95%, the average modules efficien
... Show MoreFiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More