The finishing operation of the electrochemical finishing technology (ECF) for tube of steel was investigated In this study. Experimental procedures included qualitative
and quantitative analyses for surface roughness and material removal. Qualitative analyses utilized finishing optimization of a specific specimen in various design and operating conditions; value of gap from 0.2 to 10mm, flow rate of electrolytes from 5 to 15liter/min, finishing time from 1 to 4min and the applied voltage from 6 to 12v, to find out the value of surface roughness and material removal at each electrochemical state. From the measured material removal for each process state was used to verify the relationship with finishing time of work piece. Electrochemical finishing proves an effective method to reduce the surface roughness (Ra) from 1.6μm to 0.1μm in 4 min. Finally, the observed relationships were used to predicate the diameter of blank, tool diameter and flow rate by neural network modeling ANN which has inputs defined by the finished hole diameter, surface roughness, and finishing time. Three of hidden layers and their neurons were found by an integration procedure. The design charts observed from this study utilize the designers in predication of diameter for blank and design of electrode.
Background: Prophylaxis methods are used to mechanically remove plaque and stain from tooth surfaces; such methods give rise to loss of superficial structure and roughen the surface of composites as a result of their abrasive action. This study was done to assess the effect of three polishing systems on surface texture of new anterior composites after storage in artificial saliva. Materials and methods: A total of 40 Giomer and Tetric®N-Ceram composite discs of 12 mm internal diameter and 3mm height were prepared using a specially designed cylindrical mold and were stored in artificial saliva for one month and then samples were divided into four groups according to surface treatment: Group A (control group):10 specimens received no surfa
... Show MoreWe study the physics of flow due to the interaction between a viscous dipole and boundaries that permit slip. This includes partial and free slip, and interactions near corners. The problem is investigated by using a two relaxation time lattice Boltzmann equation with moment-based boundary conditions. Navier-slip conditions, which involve gradients of the velocity, are formulated and applied locally. The implementation of free-slip conditions with the moment-based approach is discussed. Collision angles of 0°, 30°, and 45° are investigated. Stable simulations are shown for Reynolds numbers between 625 and 10 000 and various slip lengths. Vorticity generation on the wall is shown to be affected by slip length, angle of incidence,
... Show MoreThis research aims to solve the problem of selection using clustering algorithm, in this research optimal portfolio is formation using the single index model, and the real data are consisting from the stocks Iraqi Stock Exchange in the period 1/1/2007 to 31/12/2019. because the data series have missing values ,we used the two-stage missing value compensation method, the knowledge gap was inability the portfolio models to reduce The estimation error , inaccuracy of the cut-off rate and the Treynor ratio combine stocks into the portfolio that caused to decline in their performance, all these problems required employing clustering technic to data mining and regrouping it within clusters with similar characteristics to outperform the portfolio
... Show MoreThe important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi
... Show MoreNS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.
The research aimed to modeling a structural equation for tourist attraction factors in Asir Region. The research population is the people in the region, and a simple random sample of 332 individuals were selected. The factor analysis as a reliable statistical method in this phenomenon was used to modeling and testing the structural model of tourism, and analyzing the data by using SPSS and AMOS statistical computerized programs. The study reached a number of results, the most important of them are: the tourist attraction factors model consists of five factors which explain 69.3% of the total variance. These are: the provision of tourist services, social and historic factors, mountains, weather and natural parks. And the differenc
... Show MoreThis work focused on principle of higher order mode excitation using in- line Double Clad Multi-Mode Mach-Zehnder Interferometer (DC-MM-MZI). The DC-MM-MZI was designed with 50 cm etched MMF. The etching length is 5cm. The tenability of this interferometer was studied using opt grating ver.4.2.2 and optiwave
ver. 7 simulator. After removing (25, 35, 45, 55) μm from MMF and immersing this segment of MMF with water bath contained distilled water and ethanol, in addition to, air. Pulsed laser source centered at 1546.7nm ,pulse width 10ns and peak power 1.33mW was propagated via this interferometer Maximum modes were obtained in case of air surrounded media which are 9800 and 25 um removed cladding layer, with peak power 49.800 m
Abstract
A two electrode immersion electrostatic lens used in the design
of an electron gun, with small aberration, has been designed using
the finite element method (FEM). By choosing the appropriate
geometrical shape of there electrodes the potential V(r,z) and the
axial potential distribution have been computed using the FEM to
solve Laplace's equation.
The trajectory of the electron beam and the optical properties of
this lens combination of electrodes have been computed under
different magnification conditions (Zero and infinite magnification
conditions) from studying the properties of the designed electron
gun can be supplied with Abeam current of 5.7*10-6 A , electron
gun with half acceptance
Java is a high-level , third generation programming language were introduced Javaoptics Open Source Physics (OSP) as a new simulation for design one of the most important interference optical coating called antireflection coating. It is recent developments in deign thin-film coatings. (OSP) shows multiple beam interferences from a parallel dielectric thin film and the evolution of reflection factors. It is simple to use and efficiently also can serve educational purposes. The obtained results have been compared with needle method