This research introduces a developed analytical method to determine the nominal and maximum tensile stress and investigate the stress concentration factor. The required tooth fillets parametric equations and gears dimensions have been reformulated to take into account the asymmetric fillets radiuses, asymmetric pressure angle, and profile shifting non-standard modifications. An analytical technique has been developed for the determination of tooth weakest section location for standard, asymmetric fillet radiuses, asymmetric pressure angle and profile shifted involute helical and spur gears. Moreover, an analytical equation to evaluate gear tooth-loading angle at any radial distance on the involute profile of spur and helical gears, (taking into account the effect of profile shift factor) has been derived. In addition, numerical solution for the evaluation of the maximum fillet tensile stress and the combined tensile stress concentration factor for the verification of the analytical method using computer-aided engineering software (ANSYS Version 18.1). The analytical and FE result have been compared and found to be very close. The most effective method for reducing the stress concentration factor have been found by applying negative profile shifting on asymmetric tooth with lower unloaded pressure angle and high loaded pressure angle and fillet radius, which can lead to an enhancement percentage of (20%) when using a (35o/20o) asymmetric spur gear of a (24) teeth number with a shift factor of (-0.3mo) compared with standard (20o) one.
Both the double-differenced and zero-differenced GNSS positioning strategies have been widely used by the geodesists for different geodetic applications which are demanded for reliable and precise positions. A closer inspection of the requirements of these two GNSS positioning techniques, the zero-differenced positioning, which is known as Precise Point Positioning (PPP), has gained a special importance due to three main reasons. Firstly, the effective applications of PPP for geodetic purposes and precise applications depend entirely on the availability of the precise satellite products which consist of precise satellite orbital elements, precise satellite clock corrections, and Earth orientation parameters. Secondly, th
... Show MoreThis paper discusses an optimal path planning algorithm based on an Adaptive Multi-Objective Particle Swarm Optimization Algorithm (AMOPSO) for two case studies. First case, single robot wants to reach a goal in the static environment that contain two obstacles and two danger source. The second one, is improving the ability for five robots to reach the shortest way. The proposed algorithm solves the optimization problems for the first case by finding the minimum distance from initial to goal position and also ensuring that the generated path has a maximum distance from the danger zones. And for the second case, finding the shortest path for every robot and without any collision between them with the shortest time. In ord
... Show MoreObjective: To identify barriers to healthcare access, to assess the health literacy levels of the foreign-born Arabic speaking population in Iowa, USA and to measure their prevalence of seeking preventive healthcare services. Methods: A cross-sectional study of native Arabic speaking adults involved a focus group and an anonymous paper-based survey. The focus group and the Andersen Model were used to develop the survey questionnaire. The survey participants were customers at Arabic grocery stores, worshippers at the city mosque and patients at free University Clinic. Chi-square test was used to measure the relationship between the characteristics of survey participants and preventive healthcare services. Thematic analysis was
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreBackground: Chemokine (C-X-C motif) ligand (CXCL9) has an important role recruiting the T-lymphocytes and immune response after infection by inducing T-cells accumulation around the areas associated with infections. However, this role is poorly known in relation with Toxoplasma gondii infection and also in association with thyroid hormones, which the present study is focused on. Methods: Eighty-seven women were included in this study for the period between September 2021 and February 2022. Blood samples of uninfected healthy pregnant, in addition to aborted and pregnant women infected with toxoplasmosis, were collected. Sera were then obtained and stored at -10°C. Toxo-latex agglutination test was done, followed by detec
... Show More