Electrochemical machining is one of the widely used non-conventional machining processes to machine complex and difficult shapes for electrically conducting materials, such as super alloys, Ti-alloys, alloy steel, tool steel and stainless steel. Use of optimal ECM process conditions can significantly reduce the ECM operating, tooling, and maintenance cost and can produce components with higher accuracy. This paper studies the effect of process parameters on surface roughness (Ra) and material removal rate (MRR), and the optimization of process conditions in ECM. Experiments were conducted based on Taguchi’s L9 orthogonal array (OA) with three process parameters viz. current, electrolyte concentration, and inter-electrode gap. Signal-to-noise (S/N), the analysis of variance (ANOVA) was employed to find the optimal levels and to analyze the effect of electrochemical machining parameters on Ra and MRR. The surface roughness of the workpiece was decreased with the increase in current values and electrolyte concentration while causing an increase in material removal rate. The ability of the independent values to predict the dependent values (R2) were 87.5% and 96.3% for mean surface roughness and material removal rate, respectively.
In this work, varying compositions of SiO2 micro filler were added
with the Polyvinyl Chloride (PVC) and samples have been prepared
using film casting technique. The results have been analyzed and
compared for PVC samples with (1 wt%, 3 wt%, 5 wt% and 10 wt%)
SiO2 micro filler. Mechanical characteristics such as tensile strength,
elongation at break and Young`s modulus were measured for all the
samples, where the tensile strength was increased from 8.39 Mpa for
purified PVC to 16 Mpa for 3% SiO2/PVC composite. Also, thermal
conductivity measurement values illustrated that composite materials
have a good thermal insulation at 10 wt. %, thermal conductivity was
decreased from 0.1684 W/m.
The increasing Global Competitive and the continuous improvement in information technology has led the way to the development of the modern systems and using modern techniques. One of these techniques is benchmarking style and Total Quality Management all of them are used to improve the production process and target rid from the losts on the other side.
The Benchmarking style has become a very important for all the industrial systems and the serving systems as well. And an instrument to improve their performance specially those which are suffering from the highness of the costs or waste in time on the other side.
This study aims to depend on virtual Benchmarking style in the eval
... Show MoreA recently reported Nile red (NR) dye conjugated with benzothiadiazole species paves the way for the development of novel organic-based sensitizers used in solar cells whose structures are susceptible to modifications. Thus, six novel NR structures were derived from two previously developed structures in laboratories. In this study, density functional theory (DFT) calculations and time-dependent DFT (TD-DFT) were used to determine the optoelectronic properties of the NR-derived moieties such as absorption spectra. Various linkers were investigated in an attempt to understand the impact of π-linkers on the optoelectronic properties. According to the findings, the presence of furan species led to the planarity of the molecule and a reduction
... Show Moreفًي التحلٌيل اإلحصائ،ً حٌث تعتبر طرٌمة انحدار شرائح تلعب تمنٌات تحلٌل االنحدار الالمعلمً دوراً مركزٌاً لتمهٌد البٌانات، اذ ٌمكن من خاللها تمدٌر الدوال مباشرة من الجزاء واحدة من أكثر الطرائك المستعملة حالٌاً ( بدالً ة البٌانات الصاخبة)التً تحتوي على أخطاء( أو الملوثة )data noisy من االعتماد على نماذج معلمٌ محددة، وتعتمد طرٌمة التمدٌر المستعملة لمالئمه نموذج انحدار شرائح الجزاء فً الغالب على طرائك المربعات الصغر
... Show Moreتناولنا في بحثنا أحد اساليب البرمجة الخطية وهي الطريقة المبسطة لتقدير معلمات انموذج الانحدار الخطي عن طريق اختيار دالة الهدف التي تعمل على تقليل الحد الادنى لمجموع الاخطاء الناتجة من تقدير المعلمات بطريقة المربعات الصغرى الاعتيادية ( OLS) حيث سيتم في الطريقة المبسطة ( simplex) فرض قيود على نفس الاخطاء نفسها بهدف تصغيرها الى اقل ما يمكن للحصول على تقديرات افضل لمعلمات انموذج الانحدار الخطي . على اساس ان طريقة المرب
... Show MoreIn this paper, we consider a new approach to solve type of partial differential equation by using coupled Laplace transformation with decomposition method to find the exact solution for non–linear non–homogenous equation with initial conditions. The reliability for suggested approach illustrated by solving model equations such as second order linear and nonlinear Klein–Gordon equation. The application results show the efficiency and ability for suggested approach.
In this study, Zinc oxide nanostructures were synthesized via a hydrothermal method by using zinc nitrate hexahydrate and sodium hydroxide as a precursor. Three different annealing temperatures were used to study their effect on ZnO NSs properties. The synthesized nanostructure was characterized by X-ray diffraction (XRD), field emission scanning electron microscopy (FESEM), Atomic force microscope (AFM), and Fourier Transform Infrared Spectroscopy (FTIR). Their optical properties were studied by using UV -visible spectroscopy. The XRD analysis confirms that all ZnO nanostructures have the hexagonal wurtzite structure with average crystallite size within the range of (30.59 - 34
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More