Preferred Language
Articles
/
MxcsJ44BVTCNdQwCXztU
Experimental investigation and modelling of residual stresses in face milling of Al-6061-T3 using neural network
...Show More Authors

Milling process is a common machining operation that is used in the manufacturing of complex surfaces. Machining-induced residual stresses (RS) have a great impact on the performance of machined components and the surface quality in face milling operations with parameter cutting. The properties of engineering material as well as structural components, specifically fatigue life, deformation, impact resistance, corrosion resistance, and brittle fracture, can all be significantly influenced by residual stresses. Accordingly, controlling the distribution of residual stresses is indeed important to protect the piece and avoid failure. Most of the previous works inspected the material properties, tool parameters, or cutting parameters, but few of them provided the distribution of RS in a direct and singular way. This work focuses on studying and optimizing the effect of cutting speed, feed rate, and depth of cut for 6061-T3 aluminum alloy on the RS of the surface. The optimum values of geometry parameters have been found by using the L27 orthogonal array. Analysis and simulation of RS by using an artificial neural network (ANN) were carried out to predict the RS behavior due to changing machining process parameters. Using ANN to predict the behavior of RS due to changing machining process parameters is presented as a promising method. The milling process produces more RS at high cutting speed, roughly intermediate feed rate, and deeper cut, according to the results. The best residual stress obtained from ANN is ‒135.204 N/mm2 at a cutting depth of 5 mm, feed rate of 0.25 mm/rev and cutting speed of 1,000 rpm. ANN can be considered a powerful tool for estimating residual stress

Scopus Crossref
View Publication
Publication Date
Fri Dec 01 2023
Journal Name
Advances In Science And Technology Research Journal
Experimental Investigation and Fuzzy Based Prediction of Titanium Alloy Performance During Drilling Process
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Jul 31 2017
Journal Name
Journal Of Engineering
Experimental and Numerical Investigation of Hyper Composite Plate Structure Under Thermal and Mechanical Loadings
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Dec 02 2023
Journal Name
Journal Of Engineering
Simulation and Experimental Investigation of Performance and Flow Behavior for Steam Ejector Refrigeration System
...Show More Authors

The ejector refrigeration system is a desirable choice to reduce energy consumption. A Computational Fluid Dynamics CFD simulation using the ANSYS package was performed to investigate the flow inside the ejector and determine the performance of a small-scale steam ejector. The experimental results showed that at the nozzle throat diameter of 2.6 mm and the evaporator temperature of 10oC, increasing boiler temperature from 110oC to 140oC decreases the entrainment ratio by 66.25%. At the boiler temperature of 120oC, increasing the evaporator temperature from 7.5 to 15 oC increases the entrainment ratio by 65.57%. While at the boiler temperature of 120oC and

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Engineering
Experimental Investigation of the Electro Co-deposition of (Zinc-Nickel) Alloy
...Show More Authors

An experimental investigation has been carried out for zinc-nickel (Zn-Ni) electro-deposition using the constant applied current technique. Weight difference approach method was used to determine the cathode current efficiency and deposit thickness. Also, the influence effect of current density on the deposition process, solderability, and porosity of the plating layer in microelectronic applications were examined. The bath temperature effect on nickel composition and the form of the contract was studied using Scanning Electron Microscope (SEM). Moreover, elemental nature of the deposition was analyzed by Energy Dispersive X-Ray (EDX).     

It has been found that the best bath temperature

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 10 2019
Journal Name
Proceedings Of The Institution Of Mechanical Engineers, Part H: Journal Of Engineering In Medicine
The speed, reflection and intensity of waves propagating in flexible tubes with aneurysm and stenosis: Experimental investigation
...Show More Authors

A localized stenosis or aneurysm is a discontinuity that presents the pulse wave produced by the contracting heart with a reflection site. However, neither wave speed ( c) in these discontinuities nor the size of reflection in relation to the size of the discontinuity has been adequately studied before. Therefore, the aim of this work is to study the propagation of waves traversing flexible tubes in the presence of aneurysm and stenosis in vitro. We manufactured different sized four stenosis and four aneurysm silicone sections, connected one at a time to a flexible ‘mother’ tube, at the inlet of which a single semi-sinusoidal wave was generated. Pressure and velocity were measured simultaneously 25 cm downstream the inlet of th

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Robotics And Control (jrc)
Automated Stand-alone Surgical Safety Evaluation for Laparoscopic Cholecystectomy (LC) using Convolutional Neural Network and Constrained Local Models (CNN-CLM)
...Show More Authors

In this golden age of rapid development surgeons realized that AI could contribute to healthcare in all aspects, especially in surgery. The aim of the study will incorporate the use of Convolutional Neural Network and Constrained Local Models (CNN-CLM) which can make improvement for the assessment of Laparoscopic Cholecystectomy (LC) surgery not only bring opportunities for surgery but also bring challenges on the way forward by using the edge cutting technology. The problem with the current method of surgery is the lack of safety and specific complications and problems associated with safety in each laparoscopic cholecystectomy procedure. When CLM is utilize into CNN models, it is effective at predicting time series tasks like iden

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Thu Oct 13 2022
Journal Name
Computation
A Pattern-Recognizer Artificial Neural Network for the Prediction of New Crescent Visibility in Iraq
...Show More Authors

Various theories have been proposed since in last century to predict the first sighting of a new crescent moon. None of them uses the concept of machine and deep learning to process, interpret and simulate patterns hidden in databases. Many of these theories use interpolation and extrapolation techniques to identify sighting regions through such data. In this study, a pattern recognizer artificial neural network was trained to distinguish between visibility regions. Essential parameters of crescent moon sighting were collected from moon sight datasets and used to build an intelligent system of pattern recognition to predict the crescent sight conditions. The proposed ANN learned the datasets with an accuracy of more than 72% in comp

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Computational Intelligence And Neuroscience
A New Artificial Neural Network Approach in Solving Inverse Kinematics of Robotic Arm (Denso VP6242)
...Show More Authors

This paper presents a novel inverse kinematics solution for robotic arm based on artificial neural network (ANN) architecture. The motion of robotic arm is controlled by the kinematics of ANN. A new artificial neural network approach for inverse kinematics is proposed. The novelty of the proposed ANN is the inclusion of the feedback of current joint angles configuration of robotic arm as well as the desired position and orientation in the input pattern of neural network, while the traditional ANN has only the desired position and orientation of the end effector in the input pattern of neural network. In this paper, a six DOF Denso robotic arm with a gripper is controlled by ANN. The comprehensive experimental results proved the appl

... Show More
View Publication
Scopus (131)
Crossref (111)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network
...Show More Authors

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref