The objective of this work is to study the influence of end milling cutting process parameters, tool material and geometry on multi-response outputs for 4032 Al-alloy. This can be done by proposing an approach that combines Taguchi method with grey relational analysis. Three cutting parameters have been selected (spindle speed, feed rate and cut depth) with three levels for each parameter. Three tools with different materials and geometry have been also used to design the experimental tests and runs based on matrix L9. The end milling process with several output characteristics is solved using a grey relational analysis. The results of analysis of variance (ANOVA) showed that the major influencing parameters on multi-objective response were spindle speed and cutting tool with contribution percentage (52.75%, 24%), respectively. In addition, the optimum combination of end milling process parameters was then validated by performing confirmation tests to determine the improvement in multi-response outputs. The confirmation tests obtained a minimum (surface roughness and micro-hardness) and maximum metal removal rate with grey relational grade of 0.784 and improvement percentage of 2.3%.
Magneto-rheological (MR) Valve is one of the devices generally used to control the speed of Hydraulic actuator using MR fluid. The performance of valve depends on the magnetic circuit design. Present study deals with a new design of MR valve. The finite element analysis is carried out on this valve to optimize its design. The design of the magnetic circuit is accomplished by magnetic finite element software such as Finite Element Method Magnetic (FEMM). The Model dimensions of MR valve, material properties and the circuit properties of valve coil are taken into account. The results of analysis are presented in terms of magnetic strength and magnetic flux density. The valve can be operated with variable flow rate by varying the current. It i
... Show MoreEfficient cuttings transport and hole cleaning are very important factors for obtaining an effective drilling operation. In an inclined and horizontal drilling, hole cleaning issue is a common and complex problem.
The scope of this research is to study the drilling parameters which affect hole cleaning in Iraqi directional wells through studying and analyzing some drilled wells ( vertical , directional (30 degree) , directional (60 degree) and horizontal ).An excel sheet is prepared to calculate carrying capacity index which represents an indicator for good hole cleaning in different sections. The study indicated through the field investigations, practical experiences and theoretical calculations tha
... Show MoreThe aim of this paper is to investigate the effects of Nd:YAG laser shock processing (LSP) on micro-hardness and surface roughness of 86400Cu-Zn alloy. X-ray fluorescence technique was used to analyze the chemical composition of this alloy. LSP treatment was performed with a Q-switched Nd: YAG laser with a wavelength of 1064 nm. The results show that laser shock processing can significantly increase. The micro-hardness and surface roughness of the LSP-treated sample. Vickers diamond indenter was used to measure the micro-hardness of all samples with different laser pulse energy and the different number of laser pulses. It is found that the metal hardness can be significantly increased to more than 80% by increasing the laser energy and t
... Show MoreBusiness organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreFuture wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve
... Show MoreNowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In th
... Show More