This paper deals with calculate stresses in Knee-Ankle-Foot-Orthosis as a result of the effect vibration during gait cycle for patient wearing KAFO .Experimental part included measurement interface pressure between KAFO and leg due to action muscles and body weigh on Orthosis. also measurement acceleration result from motion of defected leg by accelerometer .Results of Experimental part used input in theoretical part so as to calculate stresses result from applying pressure and acceleration on KAFO by engineering analysis program ANSYS 14.Resultes show stresses values in upper KAFO greater than lower KAFO that is back to muscles more effective in thigh part lead to recoding pressure higher than pressure in shank part.
For many years controlled shot peening was considered as a surface treatment. It is now clear that the performance of control shot peening in terms of fatigue depends on the balance between its beneficial (compressive residual stress and work hardening) and beneficial effects (surface hardening).
The overall aim of this paper is to study the effects of aggressive shot peening on fatigue life of 7075 – T6 aluminum alloy. The fatigue life reduction factor (LRF) due to the aggressive shot peening was established and empirical relations were proposed to describe the behavior of LRF, roughness and fatigue life. The benefits of shot peering in terms of fatigue life are dependent on the shot peening time (SPT).
... Show MoreThe purpose of this paper is to investigate Religious Human Rights Violations. Religious liberty is essential for everyone, everywhere. Because religion is significant to everyone, everywhere. Humans are religious by nature. Our nature drives us to seek answers to deep questions about ultimate things. We cannot live a fully human life unless we are free to seek those answers and live according to the truths we discover. In this study, the researcher used Marsh and White model for analysis A sample of an offensive image of an Islamic concept from the book "Mohammad believes it or else." this book is a comic book written by pseudonym Abdullah Aziz and published by Crescent Moon Publishing company. The book is marked with anti- Mohammad, preju
... Show MoreStylistics is the analysis of the language of literary texts integrated within various approaches to create a framework of different devices that describe and distinct a particular work. Therefore, feminist stylistics relied on theories of feminist criticism tries to present a counter- image of a woman both in language use and society, to draw attention , raise awareness and change ways that gender represents. Feminist stylistic analysis is related not only to describe sexism in a text, but also to analyze the way that point of view, agency, metaphor, and transitivity choices are unanticipatedly and carefully connected to issues of gender(Mills,1995:1) &nb
... Show MoreBackground: Porcelain veneers are under a great deal of stress which may lead to clinical failure as fracture or dettachment. This study examined whether different finishing lines and lingual shoulder preparations in the incisal area of the maxillary central incisor affect the bond of the porcelain veneers. Materials and methods: A two- dimensional finite element model was made. Location and magnitude of maximum Von Mises stresses were calculated in porcelain veneer. Six types of preparations were drawn as:incisal overlap of 0.5mm, 1mm and 1.5mm depth and lingual shoulder, and incisal overlap of 0.5mm, 1mm and 1.5mm depth without shoulder preparation. Results: Stress formation is maximum in the incisal edge region. All the lingual shoulder
... Show MoreThe derivation of 5th order diagonal implicit type Runge Kutta methods (DITRKM5) for solving 3rd special order ordinary differential equations (ODEs) is introduced in the present study. The DITRKM5 techniques are the name of the approach. This approach has three equivalent non-zero diagonal elements. To investigate the current study, a variety of tests for five various initial value problems (IVPs) with different step sizes h were implemented. Then, a comparison was made with the methods indicated in the other literature of the implicit RK techniques. The numerical techniques are elucidated as the qualification regarding the efficiency and number of function evaluations compared with another literature of the implic
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MorePorosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r
... Show MoreThis research aims to choose the appropriate probability distribution to the reliability analysis for an item through collected data for operating and stoppage time of the case study.
Appropriate choice for .probability distribution is when the data look to be on or close the form fitting line for probability plot and test the data for goodness of fit .
Minitab’s 17 software was used for this purpose after arranging collected data and setting it in the the program.
&nb
... Show MoreIn this work, an experimental analysis is made to predict the thermal performance of the natural-convection phenomenon from a heated vertical externally finned-tube to surrounding air through an open-ended enclosure. Two different configurations of longitudinal rectangular fin namely, continuous and interrupted are utilized with constant thickness, different numbers, and different heights are extended radially on the outer surface of a heated tube. The tube is heated electrically from inner surface with five varied power input magnitudes. The effect of fins configuration, fins number, fins height, and heat flux of the inner tube surface on the thermal performance of natural c
... Show MoreIn this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and cons
... Show More