The turning process has various factors, which affecting machinability and should be investigated. These are surface roughness, tool life, power consumption, cutting temperature, machining force components, tool wear, and chip thickness ratio. These factors made the process nonlinear and complicated. This work aims to build neural network models to correlate the cutting parameters, namely cutting speed, depth of cut and feed rate, to the machining force and chip thickness ratio. The turning process was performed on high strength aluminum alloy 7075-T6. Three radial basis neural networks are constructed for cutting force, passive force, and feed force. In addition, a radial basis network is constructed to model the chip thickness ratio. The inputs to all networks are cutting speed, depth of cut, and feed rate. All networks performances (outputs) for all machining force components (cutting force, passive force and feed force) showed perfect match with the experimental data and the calculated correlation coefficients were equal to one. The built network for the chip thickness ratio is giving correlation coefficient equal one too, when its output compared with the experimental results. These networks (models) are used to optimize the cutting parameters that produce the lowest machining force and chip thickness ratio. The models showed that the optimum machining force was (240.46 N) which can be produced when the cutting speed (683 m/min), depth of cut (3.18 mm) and feed rate (0.27 mm/rev). The proposed network for the chip thickness ratio showed that the minimum chip thickness is (1.21), which is at cutting speed (683 m/min), depth of cut (3.18 mm) and feed rate (0.17 mm/rev).
The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreFinger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MoreThe soft sets were known since 1999, and because of their wide applications and their great flexibility to solve the problems, we used these concepts to define new types of soft limit points, that we called soft turning points.Finally, we used these points to define new types of soft separation axioms and we study their properties.
Various theories have been proposed since in last century to predict the first sighting of a new crescent moon. None of them uses the concept of machine and deep learning to process, interpret and simulate patterns hidden in databases. Many of these theories use interpolation and extrapolation techniques to identify sighting regions through such data. In this study, a pattern recognizer artificial neural network was trained to distinguish between visibility regions. Essential parameters of crescent moon sighting were collected from moon sight datasets and used to build an intelligent system of pattern recognition to predict the crescent sight conditions. The proposed ANN learned the datasets with an accuracy of more than 72% in comp
... Show MoreThis study evaluates the performance of magnetic abrasive finishing (MAF) of aluminum alloy in terms of achieving materials removal (MR). A vertical milling machine is used to perform the finishing process using a developed MAF unit that consists of an inductor made out of a 150 mm long and 20 mm diameter iron core wound with 1500 turns and 0.5 mm copper wire. The commutator and magnetic pole are attached at the top and bottom of the inductor, respectively. The required current is supplied using a DC power supply. The South Pole workpiece is a 100×50×3 mm3 plate of AA 1100 aluminum alloy, whereas the magnetic pole represented the North Pole. Pole rotational speed, applied current, and abrasive finishing time was selected as
... Show MoreThis work deals with the effect of adding aluminum nanoparticles on the mechanical properties, micro-hardness and porosity of memory-shape alloys (Cu-Al-Ni). These alloys have wide applications in various industrial fields such as (high damping compounds and self-lubricating applications). The samples are manufactured using the powder metallurgy method, which involved pressing in only one direction and sintered in a furnace surrounded by an inert gas. Four percentages (0%, 5%, 10%, and 15%) of aluminum nanoparticles were fabricated, which depended on the weight of aluminum powder (13%) in the sample under study. To find out which phase is responsible for the reliability of the formation of this type of alloy and its porosity, X-ray diffr
... Show MoreIn this paper, an algorithm is suggested to train a single layer feedforward neural network to function as a heteroassociative memory. This algorithm enhances the ability of the memory to recall the stored patterns when partially described noisy inputs patterns are presented. The algorithm relies on adapting the standard delta rule by introducing new terms, first order term and second order term to it. Results show that the heteroassociative neural network trained with this algorithm perfectly recalls the desired stored pattern when 1.6% and 3.2% special partially described noisy inputs patterns are presented.
In this article, we design an optimal neural network based on new LM training algorithm. The traditional algorithm of LM required high memory, storage and computational overhead because of it required the updated of Hessian approximations in each iteration. The suggested design implemented to converts the original problem into a minimization problem using feed forward type to solve non-linear 3D - PDEs. Also, optimal design is obtained by computing the parameters of learning with highly precise. Examples are provided to portray the efficiency and applicability of this technique. Comparisons with other designs are also conducted to demonstrate the accuracy of the proposed design.