The objective of this work is to study the influence of end milling cutting process parameters, tool material and geometry on multi-response outputs for 4032 Al-alloy. This can be done by proposing an approach that combines Taguchi method with grey relational analysis. Three cutting parameters have been selected (spindle speed, feed rate and cut depth) with three levels for each parameter. Three tools with different materials and geometry have been also used to design the experimental tests and runs based on matrix L9. The end milling process with several output characteristics is solved using a grey relational analysis. The results of analysis of variance (ANOVA) showed that the major influencing parameters on multi-objective response were spindle speed and cutting tool with contribution percentage (52.75%, 24%), respectively. In addition, the optimum combination of end milling process parameters was then validated by performing confirmation tests to determine the improvement in multi-response outputs. The confirmation tests obtained a minimum (surface roughness and micro-hardness) and maximum metal removal rate with grey relational grade of 0.784 and improvement percentage of 2.3%.
Abstract
Background: The novel coronavirus 2 (SARS?CoV?2) pandemic is a pulmonary disease, which leads to cardiac, hematologic, and renal complications. Anticoagulants are used for COVID-19 infected patients because the infection increases the risk of thrombosis. The world health organization (WHO), recommend prophylaxis dose of anticoagulants: (Enoxaparin or unfractionated Heparin for hospitalized patients with COVID-19 disease. This has created an urgent need to identify effective medications for COVID-19 prevention and treatment. The value of COVID-19 treatments is affected by cost-effectiveness analysis (CEA) to inform relative value and how to best maximize social welfare through eviden
... Show MoreGenerally, statistical methods are used in various fields of science, especially in the research field, in which Statistical analysis is carried out by adopting several techniques, according to the nature of the study and its objectives. One of these techniques is building statistical models, which is done through regression models. This technique is considered one of the most important statistical methods for studying the relationship between a dependent variable, also called (the response variable) and the other variables, called covariate variables. This research describes the estimation of the partial linear regression model, as well as the estimation of the “missing at random” values (MAR). Regarding the
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreBusiness organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreThis study presents a rapid, sensitive, and straightforward approach to measure chlorpheniramine maleate (CPM) by using turbidity CFIA. The method involves CPM reacting with sodium nitroprusside (Nitropress) to produce a pale white precipitate. The NAG-SSP-5S1D analyzer was used to measure turbidity at 0°–180° angle to detect the attenuation of incident light as a result of collision on the surfaces of the precipitate particles. The linear range of CPM measurements was between 0.008 and 11 m.mol/L, with correlation coefficient of 0.9983 and R2% = 99.65. The limit of detection was determined to be 0.0328 µg/sample from the lowest concentration in the calibration curve, and the repeatability of the method (RSD%) was less than 0.4% (n = 6
... Show MoreMost heuristic search method's performances are dependent on parameter choices. These parameter settings govern how new candidate solutions are generated and then applied by the algorithm. They essentially play a key role in determining the quality of the solution obtained and the efficiency of the search. Their fine-tuning techniques are still an on-going research area. Differential Evolution (DE) algorithm is a very powerful optimization method and has become popular in many fields. Based on the prolonged research work on DE, it is now arguably one of the most outstanding stochastic optimization algorithms for real-parameter optimization. One reason for its popularity is its widely appreciated property of having only a small number of par
... Show MoreFilms of PMMA and copper sulphate doped PMMA have been prepared by casting method. Absorbance and transmittance spectra were recorded in the wavelength range (300-900) nm in order to calculate, single oscillator energy, dispersion energy, average oscillator strength, the refractive index at infinite wavelength, M-1 and M -3 moments of the optical spectra, it was found that all these parameters were effected by doping.
CO2 Laser (10600nm) is the recent method in the management of challenging skin scar resulting from trauma, burn and surgical wound. The aim of this study was to evaluate the efficacy & safety of fractional CO2 laser (10600nm) in treatment of skin scar. Materials and Methods:Twenty patients with different types of scars treated with fractional CO2 (10600nm) laser, (10 patients) were given additional intralesional Triamcinolone. Results: All of the twenty patients included in this study showed some sort of improvements in scar texture, height and pliability and all of the ten patients who received intralesional Triamcinolone after laser show complete satisfaction. Conclusion:Fractional CO2 (10600nm) laser can be used as alternative, ef
... Show More