has experienced a step-change since the inception of ambient mass spectrometry removed the requirement for samples to be investigated under vacuum conditions. Approaches based on surface– plasma interactions are especially promising, including PADI. Whilst the mechanisms involved in generating PADI spectra still need to be unravelled, PADI shows significant promise to become a valuable and versatile tool in the instrumental arsenal available to the surface analyst
Cement-based adhesive (CBA) is used as a bonding agent in Carbon Fibre Reinforced Polymer (CFRP) applications as an alternative to epoxy-based adhesive due to the drawbacks of the epoxy system under severe service conditions which negatively affect the bond between the CFRP and strengthened elements. This paper reports the results of, an investigation carried out to develop two types of CBA using magnetized water (MW) for mixing and curing. Two magnetic devices (MD-I and MD-II), with different magnetic field strengths (9000 and 6000 Gauss) respectively, were employed for water magnetization. Different water flows with different water circulation times in the magnetizer were used for each device. Compressive and splitting tensile strength te
... Show MoreIn this paper, the system of the power plant has been investigated as a special type of industrial systems, which has a significant role in improving societies since the electrical energy has entered all kinds of industries, and it is considered as the artery of modern life.
The aim of this research is to construct a programming system, which could be used to identify the most important failure modes that are occur in a steam type of power plants. Also the effects and reasons of each failure mode could be analyzed through the usage of this programming system reaching to the basic events (main reasons) that causing each failure mode. The construction of this system for FMEA is dependi
... Show MoreIn this research want to make analysis for some indicators and it's classifications that related with the teaching process and the scientific level for graduate studies in the university by using analysis of variance for ranked data for repeated measurements instead of the ordinary analysis of variance . We reach many conclusions for the
important classifications for each indicator that has affected on the teaching process. &nb
... Show MoreBuckling analysis of composite laminates for critical thermal (uniform and linear) and mechanical loads is reported here. The objective of this work is to carry out theoretical investigation of buckling analysis of composite plates under thermomechanical loads, and experimental investigation under mechanical loads. The analytical investigation involved certain mathematical preliminaries, a study of equations of orthotropic elasticity for classical laminated plate theory (CLPT), higher order shear deformation plate theory (HSDT) , and numerical analysis (Finite element method), then the equation of motion are derived and solved using Navier method and Levy method for symmetric and anti-symmetric cross-ply and angle-ply laminated plates t
... Show MoreThe present work covers the Face-Hobbing method for generation and simulation of meshing of Face hobbed hypoid gear drive. In this work the generation process of hobbed hypoid gear has been achieved by determination of the generation function of blade cutter. The teeth surfaces have been drawn depending on the simulation of the cutting process and the head cutter motion. Tooth contact analysis (TCA) of such gear drive is presented to evaluate analytically the transmission error function for concave and convex tooth side due to misalignment errors. TCA results show that the gear is very sensitive to misalignment errors and
the increasing of the gear teeth number decrease the transmission error for both concave and convex tooth sides a
PMMA films of different thickness (0.006, 0.0105, 0.0206, 0.0385 and 0.056cm) were synthesized by casting process. The temperature and frequency dependence of dielectric constant and AC electrical conductivity measurements at various frequencies (10kHz-10MHz) and temperatures (293-373K) were carried out. Few anomalies in dielectric studies were observed near 313 and 373 K respectively. These points were related to glass transitions temperature. The variation of activation energy and conduction behavior was studied .From the AC conduction studies, it is confirmed that the mechanism responsible for the conduction process is hopping of carriers. The variations of the dielectric constant and loss as function of frequency at different tempera
... Show MoreThe most common cause of death is cardiovascular disease (CVD), with ischemic heart disease being the most notable type. There is a propensity to raise the sensitivity of methods in contemporary laboratory for diagnosing of CVD, and assessing key as CVD bio-indicators. The urgent task is to seek for different indicators as a hopeful tool for early detection and monitoring of myocardial infarction in blood samples only. This study comprised 117 Volunteers, recorded with both genders in the age range of 32-64 years old. The volunteers were categorized into two groups: 67patients of myocardial infarction, other group embraced 50 healthy individuals. The samples of blood were collected and directed for biochemical analysis to evaluate estr
... Show MoreMultiple drilling problems are being faced continuously while drilling wells in the southern Iraqi oil fields. Many of which are handled poorly and inefficiently which yields longer non-productive time due to the lack of knowledge about the source of these problems. This study aims to investigate the Basra oil fields formations from Faris to Mishrif, diagnose the potential problems, and present the optimum treatment for each problem.
Gathering of field data and previous studies on the subject, in addition to the field experience of drilling supervisors were all the information bases of this study. Southern Iraqi oil fields were studied and analyzed care
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More