CNC machines are widely used in production fields since they produce similar parts in a minimum time, at higher speed and with possibly minimum error. A control system is designed, implemented and tested to control the operation of a laboratory CNC milling machine having three axes that are moved by using a stepper motor attached to each axis. The control system includes two parts, hardware part and software part, the hardware part used a PC (works as controller) connected to the CNC machine through its parallel port by using designed interface circuit. The software part includes the algorithms needed to control the CNC. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD or 3D MAX and is saved in a well-known file format (DXF), then that file is fed to the CNC machine controller by the CNC operator, so that part will be machined by the CNC machine. The CNC controller using developed algorithms that reads the DXF file feeds to the machine, extracts (line, circle or arc) shapes from the file and generates commands to move the CNC machine axes so that these shapes can be machined.
In this study, we set up and analyze a cancer growth model that integrates a chemotherapy drug with the impact of vitamins in boosting and strengthening the immune system. The aim of this study is to determine the minimal amount of treatment required to eliminate cancer, which will help to reduce harm to patients. It is assumed that vitamins come from organic foods and beverages. The chemotherapy drug is added to delay and eliminate tumor cell growth and division. To that end, we suggest the tumor-immune model, composed of the interaction of tumor and immune cells, which is composed of two ordinary differential equations. The model’s fundamental mathematical properties, such as positivity, boundedness, and equilibrium existence, are exami
... Show MoreIn this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.
A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreKurdistan power system is expanded along years ago. The electrical power is transmitted through long transmission lines. The main problem of transmission lines is active and reactive power losses. It is important to solve this issue, unless, the most of electrical energy will lost over transmission system. In this study, High Voltage Direct Current links/bipolar connection were connected in a power system to reduce the power losses. The 132kV, 50 Hz, 36 buses Kurdistan power system is used as a study case. The load flow analysis was implemented by using ETAP.16 program in which Newton-Raphson method for three cases. The results show that the losses are reduced after inserted HVDC links.
Laser is a powerful device that has a wide range of applications in fields ranging from materials science and manufacturing to medicine and fibre optic communications. One remarkable
The avoidance strategy of prey to predation and the predation strategy for predators are important topics in evolutionary biology. Both prey and predators adjust their behaviors in order to obtain the maximal benefits and to raise their biomass for each. Therefore, this paper is aimed at studying the impact of prey’s fear and group defense against predation on the dynamics of the food-web model. Consequently, in this paper, a mathematical model that describes a tritrophic Leslie-Gower food-web system is formulated. Sokol-Howell type of function response is adapted to describe the predation process due to the prey’s group defensive capability. The effects of fear due to the predation process are considered in the first two levels
... Show MoreIn solar-thermal adsorption/desorption processes, it is not always possible to preserve equal operating times for the adsorption/desorption modes due to the fluctuating supply nature of the source which largely affects the system’s operating conditions. This paper seeks to examine the impact of adopting unequal adsorption/desorption times on the entire cooling performance of solar adsorption systems. A cooling system with silica gel–water as adsorbent-adsorbate pair has been built and tested under the climatic condition of Iraq. A mathematical model has been established to predict the system performance, and the results are successfully validated via the experimental findings. The results show that, the system can be operational
... Show MoreThe necessary optimality conditions with Lagrange multipliers are studied and derived for a new class that includes the system of Caputo–Katugampola fractional derivatives to the optimal control problems with considering the end time free. The formula for the integral by parts has been proven for the left Caputo–Katugampola fractional derivative that contributes to the finding and deriving the necessary optimality conditions. Also, three special cases are obtained, including the study of the necessary optimality conditions when both the final time and the final state are fixed. According to convexity assumptions prove that necessary optimality conditions are sufficient optimality conditions.
... Show More