CNC machine is used to machine complex or simple shapes at higher speed with maximum accuracy and minimum error. In this paper a previously designed CNC control system is used to machine ellipses and polylines. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD® or 3D MAX and is saved in a well-known file format (DXF) then that file is fed to the CNC machine controller by the CNC operator then that part will be machined by the CNC machine. The CNC controller using developed algorithms that reads the DXF file feeds to the machine, extracts the shapes from the file and generates commands to move the CNC machine axes so that these shapes can be machined.
This study was conducted in a lath house, Dept of Hort. and Landscape, College of Agricultural Engineering Sciences, Univ. During the 2021 growing season, Baghdad will investigate the influence of organic and Biological fertilizers on three Citrus rootstocks' growth and leaf mineral content. The first factor is the addition of liquid organic fertilizers Vit-Org (O) at three levels without addition (O0), soil addition at 10 ml.L-1 (O10) and soil addition at 20 ml.L-1 (O20). The second factor is the addition of nitrogen-fixing bacteria without addition (N1), add 30 ml.Transplant-1 of Azotobacter chroococcum (N2) and add 30 ml.Transplant-1 of Azospirillum brasilemse (N3). The third factor is three citrus rootstocks: sour orange (R1), R
... Show MoreThe most common artifacts in ultrasound (US) imaging are reverberation and comet-tail. These are multiple reflection echoing the interface that causing them, and result in ghost echoes in the ultrasound image. A method to reduce these unwanted artifacts using a Otsu thresholding to find region of interest (reflection echoes) and output applied to median filter to remove noise. The developed method significantly reduced the magnitude of the reverberation and comet-tail artifacts. Support Vector Machine (SVM) algorithm is most suitable for hyperplane differentiate. For that, we use image enhancement, extraction of feature, region of interest, Otsu thresholding, and finally classification image datasets to normal or abnormal image.
... Show MoreIn this paper we reported the microfabrication of three-dimensional structures using two-photon polymerization (2PP) in a mixture of MEH-PPV and an acrylic resin. Femtosecond laser operating at 800nm was employed for the two-photon polymerization processes. As a first step in this project we obtained the better composition in order to fabricate microstructers of MEH-PPV in the resin via two-photon polymerzation. Acknowledgement:This research is support by Mazur Group, Harvrad Universirt.
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreOptimization is the task of minimizing or maximizing an objective function f(x) parameterized by x. A series of effective numerical optimization methods have become popular for improving the performance and efficiency of other methods characterized by high-quality solutions and high convergence speed. In recent years, there are a lot of interest in hybrid metaheuristics, where more than one method is ideally combined into one new method that has the ability to solve many problems rapidly and efficiently. The basic concept of the proposed method is based on the addition of the acceleration part of the Gravity Search Algorithm (GSA) model in the Firefly Algorithm (FA) model and creating new individuals. Some stan
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreThe calibration of the three meter Baghdad University Radio Telescope (BURT) has been performed using two types of calibrations: Antenna Position calibration, and Detector calibration. The sun is used as a reference source to calibrate the telescope. The antenna position Azimuth (Az), and Elevation (El) are calibrate according to sun's azimuth and elevation in the date (11/10/2017; at time 10:19 AM). A calibration report is designed to illustrate the calibration parameters for each specific date and time. The detector calibration is representing a study for power spectrum response for the sun according to radio telescope frequency band (1.3 GHz – 1.5 GHz) with central frequency (1.42 GHz). Drift Scan function in the telescope's softwar
... Show More