Milling process is a common machining operation that is used in the manufacturing of complex surfaces. Machining-induced residual stresses (RS) have a great impact on the performance of machined components and the surface quality in face milling operations with parameter cutting. The properties of engineering material as well as structural components, specifically fatigue life, deformation, impact resistance, corrosion resistance, and brittle fracture, can all be significantly influenced by residual stresses. Accordingly, controlling the distribution of residual stresses is indeed important to protect the piece and avoid failure. Most of the previous works inspected the material properties, tool parameters, or cutting parameters, but few of them provided the distribution of RS in a direct and singular way. This work focuses on studying and optimizing the effect of cutting speed, feed rate, and depth of cut for 6061-T3 aluminum alloy on the RS of the surface. The optimum values of geometry parameters have been found by using the L27 orthogonal array. Analysis and simulation of RS by using an artificial neural network (ANN) were carried out to predict the RS behavior due to changing machining process parameters. Using ANN to predict the behavior of RS due to changing machining process parameters is presented as a promising method. The milling process produces more RS at high cutting speed, roughly intermediate feed rate, and deeper cut, according to the results. The best residual stress obtained from ANN is ‒135.204 N/mm2 at a cutting depth of 5 mm, feed rate of 0.25 mm/rev and cutting speed of 1,000 rpm. ANN can be considered a powerful tool for estimating residual stress
Passive optical network (PON) is a point to multipoint, bidirectional, high rate optical network for data communication. Different standards of PONs are being implemented, first of all PON was ATM PON (APON) which evolved in Broadband PON (BPON). The two major types are Ethernet PON (EPON) and Gigabit passive optical network (GPON). PON with these different standards is called xPON. To have an efficient performance for the last two standards of PON, some important issues will considered. In our work we will integrate a network with different queuing models such M/M/1 and M/M/m model. After analyzing IPACT as a DBA scheme for this integrated network, we modulate cycle time, traffic load, throughput, utilization and overall delay
... Show MoreFriction Stir Welding (FSW) is one of the most effective solid states joining process and has numerous potential applications in many industries. A FSW numerical tool, based on ANSYS F.E software, has been developed. The amount of the heat gone to the tool dictates the life of the tool and the capability of the tool to produce a good processed zone. Hence, understanding the heat transfer aspect of the friction stir welding is extremely important for improving the process. Many research works were carried out to simulate the friction stir welding using various softwares to determine the temperature distribution for a given set of welding conditions. The objective of this research is to develop a finite element sim
... Show MoreThe In this experimental study, natural stone powder was utilized to improve a cohesive soil’s compaction and strength properties. According to the significant availability of limestone in the globe, it has been chosen for the purpose of the study, in addition to considering the existing rock industry massive waste. Stone powder was used in percentages of 4, 8, 12, 16% replaced from the soil weight in dry state. Some of cohesive soil’s consistency, shear, and compaction properties were depicted after improvement. The outcomes yielded in significant amendments in the experimented geotechnical properties after stone powder addition considering 60 days curing period. Cohesion and friction angle were notably increased by
... Show MoreAnchusa strigosa L.: Hardy annual biennial or perennial herb, with hairs especially on the leaves., flowers generally regular. Commonly named (Lisan Althour) in Iraq, from Boraginaceae family. The plant contains phenolic acids, flavonoids, alkaloids, sterols, and terpenoids. The Whole plant part defatted with n-hexane for 24 hours. The defatted plant material extracted using absolute methanol by Soxhlet apparatus for 24 hours, the extract fractionated by solvents of different polarity: petroleum ether- chloroform - ethylacetate- and n-butanol respectively. The n-butanol fraction hydrolyzed with 10% HCl for 5 hours by reflex to break down the glycosidic linkage. Rosmarinic acid, caffeic acid, genistein, and silybin were isolated
... Show MoreThe historical center's landscape suffers from neglect, despite their importance and broad capabilities in enhancing the cultural value of the historical center, as landscape includes many heterogeneous human and non-human components, material and immaterial, natural and manufactured, also different historical layers, ancient, modern and contemporary. Due to the difference in these components and layers, it has become difficult for the designer to deal with it. Therefore, the research was directed by following a methodology of actor-network theory as it deals with such a complex system and concerned with an advanced method to connect the various components of considering landscape as a ground that can include various elements and deal wi
... Show MoreThis research examines the quantitative analysis to assess the efficiency of the transport network in Sadr City, where the study area suffers from a large traffic movement for the variability of traffic flow and intensity at peak hours as a result of inside traffic and outside of it, especially in the neighborhoods of population with economic concentration. &n
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.