CNC machines are widely used in production fields since they produce similar parts in a minimum time, at higher speed and with possibly minimum error. A control system is designed, implemented and tested to control the operation of a laboratory CNC milling machine having three axes that are moved by using a stepper motor attached to each axis. The control system includes two parts, hardware part and software part, the hardware part used a PC (works as controller) connected to the CNC machine through its parallel port by using designed interface circuit. The software part includes the algorithms needed to control the CNC. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD or 3D MAX and is saved in a well-known file format (DXF), then that file is fed to the CNC machine controller by the CNC operator, so that part will be machined by the CNC machine. The CNC controller using developed algorithms that reads the DXF file feeds to the machine, extracts (line, circle or arc) shapes from the file and generates commands to move the CNC machine axes so that these shapes can be machined.
Nations are developed with education and knowledge that raise the status of society in its various segments, beyond that it leads to underdevelopment and deterioration in various sectors, whether economic, health, social, etc. If we considered the general name of The ministry of Education & Scientific Studies, then the second part seems to be not functioning, since scientific research has no material allocation and remains based on the material potential of the university professor. As for the first half of the topic, the reality of the situation reveals problems related to the Holy Trinity of Education which is (Professor - Student - the scientific method) where universities suffer at the present time from this problem, and
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreUniversity campuses in Iraq are substantial energy consumers, with consumption increasing significantly during periods of high temperatures, underscoring the necessity to enhance their energy performance. Energy simulation tools offer valuable insights into evaluating and improving the energy efficiency of buildings. This study focuses on simulating passive architectural design for three selected buildings at Al-Khwarizmi College of Engineering (AKCOE) to examine the effectiveness of their cooling systems. DesignBuilder software was employed, and climatic data for a year in Baghdad was collected to assess the influence of passive architectural strategies on the thermal performance of the targeted buildings. The simulations revealed that the
... Show MoreA 3D Geological model was generated using an advanced geostatistical method for the Cretaceous reservoir in the Bai Hassan oil field. In this study, a 3D geological model was built based on data from four wells for the petrophysical property distribution of permeability, porosity, water saturation, and NTG by using Petrel 2021 software. The geological model was divided into a structural model and a property model. The geological structures of the cretaceous reservoir in the Bai Hassan oil field represent elongated anticline folds with two faults, which had been clarified in the 3D Structural model. Thirteen formations represent the Cretaceous reservoir which includes (Shiranish, Mashurah, U.kometan, Kometan Shale, L. Kometan, Gulnen
... Show MoreThe study aims to identify how to build the media message in an artistic design style (infographic) to reach the mechanism of building the media message by infographic in the researched news sites. For the survey method, which is one of the best methods used to study the subject of the research, the researcher used the method of content analysis, the employee of the research tool, a quantitative and qualitative content analysis form for the study of 74 infographics that appeared during the research period in the research sample sites. The study revealed a number of results, most notably 1. The surveyed sites employed the information in a manner based on images, shapes and data, that is, through the use of the visual element and the
... Show MoreThe research addresses smart city concept as it is the latest urban design trends, by the investment of the capabilities of human, and artificial intelligence for the sake of the advancement of the city. The concept of a smart city is described as one of the most important manifestations of the information revolution, with the end of the twentieth, and the beginning of twenty – first century, The research attributes the emergence of the concept to: deficiencies of means, and traditional methods in building and development of cities, as well as The significant increase in the number of city and global metropolises dwellers. So, smart city approach has been adopted, along with innovative principles and methods which cons
... Show MoreThe research article deals with the process of building or rebuilding the state in Iraq after 2003 in its various dimensions, in light of the vision and foundational procedures that were developed and supervised by the United States in cooperation with the new leaders of Iraq based on the mechanism of sectarianethnic representation, and diagnosing the imbalances that arose out of that vision and the accompanying procedures, which led to the emergence of new variables in the political process, especially in the post-ISIS* phase, which produced important challenges to the political system and the Iraqi state. The political dynamics and balances emerging after ISIS* represented at the same time opportunities and risks in the process of
... Show MoreSharif Mohieddin Haider worked on composing of musical compositions for the Oud different from the traditional forms known as (Peşrev, Sama'i, Longa… etc.), but they are not clear in building their musical form. This study tackles this issue by revealing the structure of the building of the musical form of these Musical compositions.
The importance of this research lies in that it provides an academic scientific study on the important subject of Musical composition forms and the way of constructing them. It helps players and students in the study of Arab music, if they want to write according to their musical form.
This research dealt with two topics in its theoretical framewo
... Show MoreRecently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an ele
... Show More