The turning process has various factors, which affecting machinability and should be investigated. These are surface roughness, tool life, power consumption, cutting temperature, machining force components, tool wear, and chip thickness ratio. These factors made the process nonlinear and complicated. This work aims to build neural network models to correlate the cutting parameters, namely cutting speed, depth of cut and feed rate, to the machining force and chip thickness ratio. The turning process was performed on high strength aluminum alloy 7075-T6. Three radial basis neural networks are constructed for cutting force, passive force, and feed force. In addition, a radial basis network is constructed to model the chip thickness ratio. The inputs to all networks are cutting speed, depth of cut, and feed rate. All networks performances (outputs) for all machining force components (cutting force, passive force and feed force) showed perfect match with the experimental data and the calculated correlation coefficients were equal to one. The built network for the chip thickness ratio is giving correlation coefficient equal one too, when its output compared with the experimental results. These networks (models) are used to optimize the cutting parameters that produce the lowest machining force and chip thickness ratio. The models showed that the optimum machining force was (240.46 N) which can be produced when the cutting speed (683 m/min), depth of cut (3.18 mm) and feed rate (0.27 mm/rev). The proposed network for the chip thickness ratio showed that the minimum chip thickness is (1.21), which is at cutting speed (683 m/min), depth of cut (3.18 mm) and feed rate (0.17 mm/rev).
The current research aims to identify the Impact of strategy of modeling in the of deductive thinking and the attitvde towards mathematics among students in the high school stage
through check the following hypotheses:
1.There is no difference statistically significant at the level (0.05) between the scores mean of the experimental group students who have studied according to the modeling strategy and scores of control group students who have studied according to ordinary method in deductive thinking.
2.
... Show MoreUnderstanding the effects of fear, quadratic fixed effort harvesting, and predator-dependent refuge are essential topics in ecology. Accordingly, a modified Leslie–Gower prey–predator model incorporating these biological factors is mathematically modeled using the Beddington–DeAngelis type of functional response to describe the predation processes. The model’s qualitative features are investigated, including local equilibria stability, permanence, and global stability. Bifurcation analysis is carried out on the temporal model to identify local bifurcations such as transcritical, saddle-node, and Hopf bifurcation. A comprehensive numerical inquiry is carried out using MATLAB to verify the obtained theoretical findings and und
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreRealizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized
... Show MoreThe major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R2) is 0.077 m observed in Northing. While in
In this paper, a fixed point theorem of nonexpansive mapping is established to study the existence and sufficient conditions for the controllability of nonlinear fractional control systems in reflexive Banach spaces. The result so obtained have been modified and developed in arbitrary space having Opial’s condition by using fixed point theorem deals with nonexpansive mapping defined on a set has normal structure. An application is provided to show the effectiveness of the obtained result.
This paper presents an efficient methodology to design modified evaporative air-cooler for winter air-conditioning in Baghdad city as well as using it for summer air-conditioning by adding a heating process after the humidification process. laboratory tests were performed on a direct evaporative cooler (DEC) followed by passing the air on hot water through heat exchanger placed in the coolers air duct exit. The tests were conducted on the 2nd of December /2011 when the ambient temperature was 8.1°C and the relative humidity was (68%). The air flow rate is assumed to vary between 0.069 to 0.209 kg/s with constant water flow rate of 0.03 kg/s in the heat exchanger. The performance is reported in terms of effectiveness of DEC, satura
... Show MoreIn this paper, Touchard polynomials (TPs) are presented for solving Linear Volterra integral equations of the second kind (LVIEs-2k) and the first kind (LVIEs-1k) besides, the singular kernel type of this equation. Illustrative examples show the efficiency of the presented method, and the approximate numerical (AN) solutions are compared with one another method in some examples. All calculations and graphs are performed by program MATLAB2018b.