The present work covers the Face-Hobbing method for generation and simulation of meshing of Face hobbed hypoid gear drive. In this work the generation process of hobbed hypoid gear has been achieved by determination of the generation function of blade cutter. The teeth surfaces have been drawn depending on the simulation of the cutting process and the head cutter motion. Tooth contact analysis (TCA) of such gear drive is presented to evaluate analytically the transmission error function for concave and convex tooth side due to misalignment errors. TCA results show that the gear is very sensitive to misalignment errors and
the increasing of the gear teeth number decrease the transmission error for both concave and convex tooth sides and ensure smooth motion with low vibration.
The aim of research is to show the effect of Ferric Oxide (Fe2O3) on the electricity production and wastewater treatment, since 2.5% of Ferric Oxide (Fe2O3) (heated and non heated) nanoparticles has been used. Characterization of nanoparticles was done using X-ray Diffraction (XRD) and Scan Electron Microscopy (SEM). The influence of acidity was also studied on both wastewater treatmenton the Chemical Oxygen demand (COD) and Biological Oxygen Demand (BOD) and voltage output was studied. From the results, it was infused that the dosage of 0.025 g/l and an initial pH 7 were founded to be optimum for the effective degradation of effluents. The results concluded that the treatment of anaerobic sludge wastewater using Ferric Oxide (Fe2O3) in
... Show MoreIn this paper, the 5 minutes measured wind speed data for year 2012 at 10 meter height for Tweitha have been statically analyzed to assess the time of wind turbine electrical power generation. After collection Tweitha wind data and calculation of mean wind speed the cumulative Weibull diagram and probability density function was ploted, then each of cumulative Weibull distribution, cut-in and furling turbine wind speed could be used as a mathematical input parameters in order to estimate the hours of electrical power generation for wind turbine during one day or one year. In Tweitha site, found that the average wind speed was (v= 1.76 m/s), so five different wind turbines were be selected to calculate hours of electrical generation for A
... Show MoreAn approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si
... Show MoreIn this work, the possibility of utilizing osmosis phenomenon to produce energy as a type of the renewable energy using Thin Film Composite Ultra Low Pressure membrane TFC-ULP was studied. Where by forward osmosis water passes through the membrane toward the concentrated brine solution, this will lead to raise the head of the high brine solution. This developed static head may be used to produce energy. The aim of the present work is to study the static head developed and the flux on the high brine water solution side when using forward and reverse osmosis membranes for an initial concentration range from 35-300 g/l for each type of membrane used at room temperature and pressure conditions, and finally calculating the maximum possible po
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreIn this study, polymeric coating was developed by incorporating nano graphene in the polymer blend with applications to oil storage tanks. The oil storage tanks samples were brought from the oil Pipeline Company / Doura refinery in Baghdad. The coating polymer was formed with a blend (epoxy resin and repcoat ZR). The proportion of mixing the mixture was 3:1:1 epoxy resin 21.06 gm: repcoat ZR 10.53 gm: hardener 10.53 gm. The blend/graphene was prepared using in stui-polymerization method with different weight percentage 1, 3, 5, and 7 wt % added to blend. The resulting solution was put in a glass tube on a magnetic stirrer for one hour at a temperature of 40 °C. The result of contact angle and water absorption the best ratio of 3wt
... Show More