Milling process is a common machining operation that is used in the manufacturing of complex surfaces. Machining-induced residual stresses (RS) have a great impact on the performance of machined components and the surface quality in face milling operations with parameter cutting. The properties of engineering material as well as structural components, specifically fatigue life, deformation, impact resistance, corrosion resistance, and brittle fracture, can all be significantly influenced by residual stresses. Accordingly, controlling the distribution of residual stresses is indeed important to protect the piece and avoid failure. Most of the previous works inspected the material properties, tool parameters, or cutting parameters, but few of them provided the distribution of RS in a direct and singular way. This work focuses on studying and optimizing the effect of cutting speed, feed rate, and depth of cut for 6061-T3 aluminum alloy on the RS of the surface. The optimum values of geometry parameters have been found by using the L27 orthogonal array. Analysis and simulation of RS by using an artificial neural network (ANN) were carried out to predict the RS behavior due to changing machining process parameters. Using ANN to predict the behavior of RS due to changing machining process parameters is presented as a promising method. The milling process produces more RS at high cutting speed, roughly intermediate feed rate, and deeper cut, according to the results. The best residual stress obtained from ANN is ‒135.204 N/mm2 at a cutting depth of 5 mm, feed rate of 0.25 mm/rev and cutting speed of 1,000 rpm. ANN can be considered a powerful tool for estimating residual stress
The sale of facial features is a new modern contractual development that resulted from the fast transformations in technology, leading to legal, and ethical obligations. As the need rises for human faces to be used in robots, especially in relation to industries that necessitate direct human interaction, like hospitality and retail, the potential of Artificial Intelligence (AI) generated hyper realistic facial images poses legal and cybersecurity challenges. This paper examines the legal terrain that has developed in the sale of real and AI generated human facial features, and specifically the risks of identity fraud, data misuse and privacy violations. Deep learning (DL) algorithms are analyzed for their ability to detect AI genera
... Show MoreIn this study, the response and behavior of machine foundations resting on dry and saturated sand was investigated experimentally. In order to investigate the response of soil and footing to steady state dynamic loading, a physical model was manufactured. The manufactured physical model could be used to simulate steady state harmonic load at different operating frequencies. Total of (84) physical models were performed. The parameters that were taken into considerations include loading frequency, size of footing and different soil conditions. The footing parameters were related to the size of the rectangular footing and depth of embedment. Two sizes of rectangular steel model footing were used (100 200 12.5 mm) and (200 400 5.0 mm).
... Show MoreThe inverse kinematics of redundant manipulators has infinite solutions by using conventional methods, so that, this work presents applicability of intelligent tool (artificial neural network ANN) for finding one desired solution from these solutions. The inverse analysis and trajectory planning of a three link redundant planar robot have been studied in this work using a proposed dual neural networks model (DNNM), which shows a predictable time decreasing in the training session. The effect of the number of the training sets on the DNNM output and the number of NN layers have been studied. Several trajectories have been implemented using point to point trajectory planning algorithm with DNNM and the result shows good accuracy of the end
... Show MoreIn this study, experimental and numerical applied of heat distribution due to pulsed Nd: YAG laser surface melting. Experimental side was consists of laser parameters are, pulse duration1.3
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreIn this study, the response of ten composite post-tensioned concrete beams topped by a reinforced concrete deck with adequate reinforcing shear connectors is investigated. Depending on the concrete compressive strength of the deck slab (20, 30, and 40 MPa), beams are grouped into three categories. Seven of these beams are exposed to a fire attack of 700 and 800 °C temperature simultaneously with or without the presence of a uniformly distributed sustained static loading. After cooling back to ambient temperature, these composite beams are loaded up to failure, using a force control module, by monotonic static loading in a four-point-bending setup with two symmetrical concentrated loads applied in
In this study, the response of ten composite post-tensioned concrete beams topped by a reinforced concrete deck with adequate reinforcing shear connectors is investigated. Depending on the concrete compressive strength of the deck slab (20, 30, and 40 MPa), beams are grouped into three categories. Seven of these beams are exposed to a fire attack of 700 and 800 °C temperature simultaneously with or without the presence of a uniformly distributed sustained static loading. After cooling back to ambient temperature, these composite beams are loaded up to failure, using a force control module, by monotonic static loading in a four-point-bending setup with two symmetrical concentrated loads applied in