Preferred Language
Articles
/
alkej-674
Prediction of Cutting Force in Turning Process by Using Artificial Neural Network
...Show More Authors

       

Cutting forces are important factors for determining machine serviceability and product quality. Factors such as speed feed, depth of cut and tool noise radius affect on surface roughness and cutting forces in turning operation. The artificial neural network model was used to predict cutting forces with related to inputs including cutting speed (m/min), feed rate (mm/rev), depth of cut (mm) and work piece hardness (Map). The outputs of the ANN model are the machined cutting force parameters, the neural network showed that all (outputs) of all components of the processing force cutting force FT (N), feed force FA (N) and radial force FR (N) perfect accordance with the experimental data. Twenty-five samples of experimental data were used, including nineteen to train the network. Moreover six other experimental tests were implemented to test the network. The study concludes that ANN was a dependable and precise method for predicting machining parameters in CNC turning operation.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Moral Intelligence of Internal Auditors in Support of the Performance of Internal Audit Process - Study for Opinions of a Sample of Internal Auditors in Iraq
...Show More Authors

Abstract

      The  aim of  the research to define the concept of moral intelligence and its dimensions and its relationship to some personal characteristics with the internal auditors and identify the importance of the employment of moral intelligence dimensions of (empathy, conscience, self- control, respect, kindness, tolerance, fairness) in the internal audit and the extent of support for the performance of the internal audit process in light of these dimensions. And that by answering the following question : Is there a role for moral intelligence  of  internal auditors in support the performance of internal audit process ? How are employ these dimensions i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Ifip Advances In Information And Communication Technology
Rapid Thrombogenesis Prediction in Covid-19 Patients Using Machine Learning
...Show More Authors

Machine Learning (ML) algorithms are increasingly being utilized in the medical field to manage and diagnose diseases, leading to improved patient treatment and disease management. Several recent studies have found that Covid-19 patients have a higher incidence of blood clots, and understanding the pathological pathways that lead to blood clot formation (thrombogenesis) is critical. Current methods of reporting thrombogenesis-related fluid dynamic metrics for patient-specific anatomies are based on computational fluid dynamics (CFD) analysis, which can take weeks to months for a single patient. In this paper, we propose a ML-based method for rapid thrombogenesis prediction in the carotid artery of Covid-19 patients. Our proposed system aims

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Improving Shear Strength of Soft Clay by Using Torn Belts Chips
...Show More Authors

Random throwing of industrial waste has a significant impact on the environment unless it takes into account the conditions of engineered destroying and/or re-used. Taking the advantage of re-using waste materials in engineering projects represents a well-planned project in order to resolve a lot of engineering problems for some difficult soils. The objective of this study was to evaluate the capability and effects of Rubber Shreds (RS) from scrap torn belts towards improving the shear strength of soft clay. A direct shear tests were conducted on soft clay-RS mixture. The following parameters were investigated to study the influence of RS content, water content, normal stress, and dilation ratio. From experimental test results it was fou

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Treatment of Slack Wax by Thermal Cracking Process
...Show More Authors

This work deals with thermal cracking of slack wax produced as a byproduct from solvent dewaxing process of medium lubricating oil fraction in AL-Dura refinery. The thermal cracking process was carried out at a temperature ranges 480-540 ºC and atmospheric pressure. The liquid hourly space velocity (LHSV) for thermal cracking was varied between 1.0-2.5 . It was found that the conversion increased (61 - 83) with the increasing of reaction temperature (480 - 540) and decreased (83 - 63) with the increasing of liquid hourly space velocity (1.0 - 2.5).
The maximum gasoline yield obtained by thermal cracking process (48.52 wt. % of feed) was obtained at 500 ºC and liquid hour space velocity 1 . The obtaining liquid product at the best op

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Eastern-european Journal Of Enterprise Technologies
Investigation of evaluated temperature oxidation for IN-738 LC superalloy turbine blade thermally coated by AL2O3 using slurry coating process
...Show More Authors

The study aims to investigate the effect of Al2O3 and Al additions to Nickel-base superalloys as a coating layer on oxidation resistance, and structural behavior of nickel superalloys such as IN 738 LC. Nickel-base superalloys are popular as base materials for hot components in industrial gas turbines such as blades due to their superior mechanical performance and high-temperature oxidation resistance, but the combustion gases' existence generates hot oxidation at high temperatures for long durations of time, resulting in corrosion of turbine blades which lead to massive economic losses. Turbine blades used in Iraqi electrical gas power stations require costly maintenance using traditional processes regularly. These blades are made

... Show More
View Publication
Crossref
Publication Date
Tue Jan 16 2018
Journal Name
Design And Manufacture An Automatic Knife For Date Palm Tree Frond Cutting Operates By Frequency Theory Cutting‏ Mra Abdulrazak A. Jasim‏
Design and manufacture an automatic knife for date palm tree frond cutting Operates by frequency theory Cutting‏
...Show More Authors

Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (19)
Crossref (10)
Scopus Crossref
Publication Date
Mon Oct 10 2022
Journal Name
International Journal Of Mathematics In Operational Research
Modelling time-series process of an agricultural crop production process by EWMA quality control chart
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref