CNC machine is used to machine complex or simple shapes at higher speed with maximum accuracy and minimum error. In this paper a previously designed CNC control system is used to machine ellipses and polylines. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD® or 3D MAX and is saved in a well-known file format (DXF) then that file is fed to the CNC machine controller by the CNC operator then that part will be machined by the CNC machine. The CNC controller using developed algorithms that reads the DXF file feeds to the machine, extracts the shapes from the file and generates commands to move the CNC machine axes so that these shapes can be machined.
Farmers keep trying to avoid using chemical fertilizer without losing high yield. A field experiment was conducted in the fields of Agriculture College, University of Baghdad during winter seasons of 2015 and 2016 to investigate the response of three bread wheat (Triticum aestivum L.) cultivars (Ibaa99, Abu-Ghraib3 and Buhooth22) to the frequency of spraying with biofertilizer (EM-1) (one time at tillering stage, twice at tillering and stem elongation stages and three times at tillering, stem elongation and booting stages) in addition to the control (without spraying), to the increase of grain yield. Randomized complete block design (RCBD), in split plots arrangement and four replications, was used. Spraying treatments were placed as main p
... Show MoreA three species food web model involving a stage structure and cannibalism in the top predator species is proposed and studied. It is assumed that the prey species growth logistically in the absence of predator and the predation process occurred according to theLotka-Volterra functional response. The existence, uniqueness and bounded-ness of the solution of the model are investigated. The local and global stability conditions of all possible equilibrium points are established.The persistence conditions of the model are also determined. The local bifurcation near each of the equilibrium points is analyzed. The global dynamics of the model is investigated numerically and compared with the obtained analytical results. It is observed that the p
... Show MoreThe research aims to get acquainted with the evaluation of the reality of the application of the curriculum axis from among the eight Iraqi academic accreditation standards in a sample of governmental and private universities and colleges in Iraq and to identify the main and secondary reasons for it as well as to provide proposed mechanisms and procedures to help reduce gaps, If the research problem is represented in the weak availability of the requirements of the curriculum axis in universities and colleges (the study sample) due to the weak documentation and successful implementation of them and interest in them is still below the level of ambition, In order to arrive at scientific facts, the researchers adopted the comparativ
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreWith the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show MoreCassava, a significant crop in Africa, Asia, and South America, is a staple food for millions. However, classifying cassava species using conventional color, texture, and shape features is inefficient, as cassava leaves exhibit similarities across different types, including toxic and non-toxic varieties. This research aims to overcome the limitations of traditional classification methods by employing deep learning techniques with pre-trained AlexNet as the feature extractor to accurately classify four types of cassava: Gajah, Manggu, Kapok, and Beracun. The dataset was collected from local farms in Lamongan Indonesia. To collect images with agricultural research experts, the dataset consists of 1,400 images, and each type of cassava has
... Show MoreThe influence of process speed (PS) and tillage depth (TD) , on growth of corn (Zea mays L) yield, for Maha cultivar, were tested at two ranges of PS of 2.483 and 4.011 km.hr-1, and three ranges of TD of 15,20 and 25cm. The experiments were conducted in a factorial experiment under complete randomized design with three replications. The results showed that the PS of 2.483 km.hr-1 was significantly better than the PS of 4.011km.hr-1 in all studied conditions. The , slippage ratio (SR) and the machine efficiency (ME), the physical soil characteristics represented by the soil density and porosity (SBD and TSP), and the plant characteristics represented the roots dry weight, PVI and the crop productivity (CP), except adjective of the fu
... Show MoreDue to the need for controlling and regulating of feed pellet. Pellet that is imported or locally manufactured is accompanied by cracking and crumbling percentage that occur during transporting and distributing to animals, using conveyors and mechanical feeders. This study aimed to determine the effect of particle size and die holes diameter in the machine on broiler feed pellets quality in pellet durability, pellet direct measurement, pellet expansion, and pellet length. Three particle size 2, 4, and 6 mm, and three diameters of die holes in the machine 3, 4, and 5 mm, have been used. The results showed that changing the particle size from 2 to 4 then to 6 mm led to a significant decrease in pellet durability and pellet lengths, pe
... Show MoreThis study is qualitative, it illustrates H.G. Wells\\'s The Time Machine through the scientific and social framework of the Victorian Era. Wells\\'s portrayal of future societies examines the rapid technological progress and social changes of the 19th century. The analysis scrutinizes the division between the Eloi and the Morlocks, tracing the consequences of social division. To meet the objective of the study, Victorian frame of mind is utilized to examine the class struggle that is symbolized by the Eloi and the Morlocks. The analysis highlights the economic and social effects of industrialization and how Wells examines the capitalist system and its impact on human relationships and class division. The study also utilizes concepts from D
... Show More