Abstract. This study presents experimental and numerical investigation on the effectiveness of electrode geometry on flushing and debris removal in Electrical Discharge Drilling (EDD) process. A new electrode geometry, namely side-cut electrode, was designed and manufactured based on circular electrode geometry. Several drilling operations were performed on stainless steel 304 using rotary tubular electrodes with circular and side-cut geometries. Drilling performance was characterized by Material Removal Rate (MRR), Electrode Wear Rate (EWR), and Tool Wear Ratio (TWR). Dimensional features and surface quality of drilled holes were evaluated based on Overcut (OC), Hole Depth (HD), and Surface Roughness (SR). Three-dimensional three-phase CFD models were built using ANSYS FLUENT software to simulate the flow field at interelectrode gap. Results revealed that the overall performance of side-cut electrode was superior due to improved erosion rates and flushing capabilities, resulting in production of deep holes with good dimensional accuracy and surface quality.
The study is concerned with the problem of the earthly identity of kindergarten children by verifying its aims in identifying the earthly identity of the first level of kindergarten children and the earthly identity of both levels of the kindergarten. The research also aims to identify the earthly identity of male and female kindergarten children. The study population is represented in public and private kindergartens on both sides of Baghdad city, Karkh & Rusafa for the academic year (2022-2023). The earthly identity test in its final form consisted of (10) items. The test was administered to a sample of (400) children in public and private kindergartens, who were selected randomly. The results showed that kindergarten children have
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreTake the teacher's key position in the educational system as a foundation stone and primarily responsible for achieving the goals of Education , and efficient teacher conscious is the teacher who prepared educationally and specialized training well add to the enjoyment of a range of features that enable them to adjust and compatibility with educational developments
Hence the problem of the study questioning the Kindergarten Does teacher professional awareness that enable it to perform its work learned from experienceThe research sought to measure
1-Professional awareness among teacher Kindergarten
2-Professional awareness of Kindergarten parameters depending on the type of kindergarten.
Limited search parameters Riyadh govern
This study aims to illustrate and compare the perspectives of Ibn Sahnun and al-Kabasi about educational system. To this end, the researcher adopted the inductive-analytical approach to analyze their educational perspectives. The study included two chapters: one to give an overview of the life of Ibn Sahnun and al-Kabasi and the other to analyze their perspectives. The findings revealed Ibn Sahnun and al-Kabasi confirmed that compliance with the Islamic rules is an essential condition over all aspects. As for Ibn Sahnun pointed out to the important of teaching Quran as a basic reference and guide of Muslim daily-life skills and behaviors. On the other hand, al-Kabasi focused on the creation and religion as two-main aspe
... Show MoreExplainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show MoreThis paper demonstrates an experimental and numerical study aimed to compare the influence of openings of different configurations on the flexural behavior of prestressed concrete rafters. The experimental program consisted of testing six simply supported prestressed concrete rafters; 5 rafters are perforated, and the other one is solid as a reference. All rafters were tested under monotonic midpoint load. The variable which has been investigated in this work was the opening’s configuration (quadrilateral or circular) with the same upper and lower chords depths. The results indicate improvement in the beam flexural behavior using the circular openings compared to the quadrilateral o