Electrical Discharge Machining (EDM) is a widespread Nontraditional Machining (NTM) processes for manufacturing of a complicated geometry or very hard metals parts that are difficult to machine by traditional machining operations. Electrical discharge machining is a material removal (MR) process characterized by using electrical discharge erosion. This paper discusses the optimal parameters of EDM on high-speed steel (HSS) AISI M2 as a workpiece using copper and brass as an electrode. The input parameters used for experimental work are current (10, 24 and 42 A), pulse on time (100, 150 and 200 µs), and pulse off time (4, 12 and 25 µs) that have effect on the material removal rate (MRR), electrode wear rate (EWR) and wear ratio (WR). A Minitab software environment was used to adopt Taguchi method to analyze the effect of input on output parameters of EDM. The results of the present work showed that the best of MRR in copper and brass electrodes with (current 42 A, pulse on time 100 µs and pulse off time 25 µs) are (84.355×10-3 g/min) and (43.243×10-3 g/min) respectively, and the MRR predicted by Taguchi are (86.1751×10-3 g/min) in copper electrode by using the parameters with (current 10 A, pulse on time 200 µs and pulse off time 25 µs) and (43.2979×10-3 g/min) in brass electrode at current 42 A, pulse on time 100 µs, and pulse off time 25 µs. The lowest EWR occurs with a value of (1.4510×10-3 g/min) with (current 10 A, pulse on time 100 µs, pulse off time 4 µs) variables when using a copper electrode. The highest WR (2.602508) was found for the brass electrode with (current 24 A, pulse on time 200 µs, pulse off time 4 µs) variables.
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreIn this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show MorePurpose - This study relies on the descriptive and analytical approach through collecting and analyzing the necessary data, as this approach focuses on polling the opinions of the research sample and its directions, and aims to develop a model that studies the relationship between knowledge creation and organizational ambidexterity in Iraqi private banks and verifying its validity experimentally.
Design / Methodology / Introduction - A survey was conducted through a questionnaire form to collect data from a sample of (113) managers in private commercial banks. In addition, this study used the AMOS program and the ready-to-use statistical program package (SPSS V.25) to test the proposed hypotheses of the t
... Show MoreWill address this research interaction and coordination between fiscal and monetary policies and the impact of this interaction and coordination on economic stability and growth، and how the financial implications of monetary policy may stimulate action monetary policy and treatment side effects and the nature of responsiveness and bounce between procedures both two policies and their impact on the balance of overall economic and explained in the folds of searchjustifications coordination and the extent necessary in order to address the imbalances in economic activity through twinning actions of monetary and fiscal، has embodied this coordination and interaction between policies and their impact m
... Show MoreA sensitivity-turbidimetric method at (0-180o) was used for detn. of mebeverine in drugs by two solar cell and six source with C.F.I.A.. The method was based on the formation of ion pair for the pinkish banana color precipitate by the reaction of Mebeverine hydrochloride with Phosphotungstic acid. Turbidity was measured via the reflection of incident light that collides on the surface particles of precipitated at 0-180o. All variables were optimized. The linearity ranged of Mebeverine hydrochloride was 0.05-12.5mmol.L-1, the L.D. (S/N= 3)(3SB) was 521.92 ng/sample depending on dilution for the minimum concentration , with correlation coefficient r = 0.9966while was R.S.D%
... Show MoreAspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.
Longitudinal data is becoming increasingly common, especially in the medical and economic fields, and various methods have been analyzed and developed to analyze this type of data.
In this research, the focus was on compiling and analyzing this data, as cluster analysis plays an important role in identifying and grouping co-expressed subfiles over time and employing them on the nonparametric smoothing cubic B-spline model, which is characterized by providing continuous first and second derivatives, resulting in a smoother curve with fewer abrupt changes in slope. It is also more flexible and can pick up on more complex patterns and fluctuations in the data.
The longitudinal balanced data profile was compiled into subgroup
... Show MoreToday, urban Stormwater management is one of the main concerns of municipalities and stakeholders. Drought and water scarcity made rainwater harvesting one of the main steps toward climate change adaptation. Due to the deterioration of the quality of urban runoff and the increase of impermeable urban land use, the treatment of urban runoff is essential. Best Management Practice (BMP) and Low Impact Development (LID) approaches are necessary to combat climate change consequences by improving the quantity and quality of water resources. The application of Bioswales along urban streets and roadways can reduce the stress on water resources, recharge groundwater and prevent groundwater pollution. While Sulaymaniyah City has a
... Show MoreDepletion of fossil fuel is one of the main reasons why the bioethanol has become popular. It is a renewable energy source. In order to meet the great demand of bioethanol, it is best that the bioethanol production is from cheap raw materials. Since the golden shower fruit is not being utilized and is considered as waste material, hence, this study was conducted to make use of the large volume of the residue as feedstock to test its potential for bioethanol extraction.The main goal of this study is to obtain the most volume of bioethanol from the golden shower fruit liquid residue by the factors, days of fermentation (3, 5, and 7 days) and sugar concentration (15, 20 and 25 brix) of the liquid residue. Also, part of the study is to compu
... Show MoreThe sustainable competitive advantage for organizations is one of the requirements for value creation, which centered on the possession of scarce resources that achieve maximum flows to invest in intellectual capital, if what has been interest in them, measured and employed the way properly and style, so I figured the need for new technologies to enable organizations to measure the intellectual and physical assets and to assess its performance accordingly, so it sheds search light on the measurement of the added value of existing knowledge using the standard value-added factor is the intellectual (value added intellectual coefficient) (VAIC) and to develop a set of assumptions about the extent of the difference between the sample
... Show More