In present work an investigation for precise hole drilling via continuous wave (CW) CO2 laser at 150 W maximum output power and wavelength 10.6 μm was achieved with the assistance of computerized numerical controlled (CNC) machine and assist gases. The drilling process was done for thin sheets (0.1 – 0.3 mm) of two types of metals; stainless steel (sst) 321H, steel 33 (st). Changing light and process parameters such as laser power, exposure time and gas pressure was important for getting the optimum results. The obtained results were supported with computational results using the COMSOL 3.5a software code.
Factors affecting consumer consumerism Iraqi The research aims to shed light on the factors influencing consumer consumerism Iraqi and arranged in terms of the degree of importance in influencing through poll sample, which amounted to (85) members of the shoppers of electrical goods in the markets of Baghdad, Questionnaire has been used as a tool head to collect data and information from the sample surveyed and their answers were analyzed using factor analysis and test ( ), and The research group was the most prominent
The research aim to know the effect of note–taking by computer method as amentalactivators in achievement of physics subject for the first intermediate class students.
To investigate from aim of the research the research sample was chosen from the first intermediate class students in Al–mutamyzat secondary school for girls. Which belongs to the general administration for the second karkh education which randomly chosen from (9) schools for distinct female students in Baghdad. Then randomly chosen two sections form three about (80) female students at (66.667%) from total sample it’s about (120) female student in the three sections. The randomly chosen too, section (a) to represent experimental group it’s about (41) female
... Show MoreAbstract
This paper presents an intelligent model reference adaptive control (MRAC) utilizing a self-recurrent wavelet neural network (SRWNN) to control nonlinear systems. The proposed SRWNN is an improved version of a previously reported wavelet neural network (WNN). In particular, this improvement was achieved by adopting two modifications to the original WNN structure. These modifications include, firstly, the utilization of a specific initialization phase to improve the convergence to the optimal weight values, and secondly, the inclusion of self-feedback weights to the wavelons of the wavelet layer. Furthermore, an on-line training procedure was proposed to enhance the control per
... Show Moreاتجهت دول العالم الى تسخير جميع الإمكانيات والخبرات والعلوم من اجل الوصول الى مستويات متقدمة في الرياضات المختلفة ويهدف التدريب الرياضي إلى إعداد اللاعبين إعدادا جيدا تكمن مشكلة البحث من خلال خبرة الباحثتان الميدانية ومتابعة تدريبات لاعبي المدرسة التخصصية كرة اليد فقد لوحظ هناك ضعف واضح في الأداء المهاري ولابد من تطوير أوجه الضعف لتحقيق مستوى انجاز افضل . ويهدف البحث اعداد تمرينات خاصة بأستخدام جهاز ا
... Show MoreIn the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe
... Show MoreExchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show MoreA .technology analysis image using crops agricultural of grading and sorting the test to conducted was experiment The device coupling the of sensor a with camera a and 75 * 75 * 50 dimensions with shape cube studio made-factory locally the study to studio the in taken were photos and ,)blue-green - red (lighting triple with equipped was studio The .used were neural artificial and technology processing image using maturity and quality ,damage of fruits the of characteristics external value the quality 0.92062, of was value regression the damage predict to used was network neural artificial The .network the using scheme regression a of means by 0.98654 of was regression the of maturity and 0.97981 of was regression the of .algorithm Marr
... Show More