This research introduces a developed analytical method to determine the nominal and maximum tensile stress and investigate the stress concentration factor. The required tooth fillets parametric equations and gears dimensions have been reformulated to take into account the asymmetric fillets radiuses, asymmetric pressure angle, and profile shifting non-standard modifications. An analytical technique has been developed for the determination of tooth weakest section location for standard, asymmetric fillet radiuses, asymmetric pressure angle and profile shifted involute helical and spur gears. Moreover, an analytical equation to evaluate gear tooth-loading angle at any radial distance on the involute profile of spur and helical gears, (taking into account the effect of profile shift factor) has been derived. In addition, numerical solution for the evaluation of the maximum fillet tensile stress and the combined tensile stress concentration factor for the verification of the analytical method using computer-aided engineering software (ANSYS Version 18.1). The analytical and FE result have been compared and found to be very close. The most effective method for reducing the stress concentration factor have been found by applying negative profile shifting on asymmetric tooth with lower unloaded pressure angle and high loaded pressure angle and fillet radius, which can lead to an enhancement percentage of (20%) when using a (35o/20o) asymmetric spur gear of a (24) teeth number with a shift factor of (-0.3mo) compared with standard (20o) one.
The current research aims to identify the time-management skills based on the post-test of the experimental group as well as to examine the effect of a training program on developing the skills of managing time among the study sample. To achieve the research objectives, the researcher designed a scale of time management skill included (30) paragraphs. The research reached that the training program is significantly effective in managing and organizing time. There are statistically significant differences in pre-posttest between the experimental and control groups.
Abstract
This research aims to develop a unit as part of a sixth-grade Arabic language textbook and measure its effectiveness in the development of twenty-first-century skills of female students. The author adopted the experimental approach with a quasi-experimental design of the pre-post single-group. A list of the major skills was derived from the framework for the 21st-century skills of the mother tongue that was developed by the Partnership for 21st-Century Skills and reviewed and adjusted by some specialists. According to their views, the unit was developed. The study targeted 15 sub-skills falling under three main skills. The results of the study showed the effectiveness of the developed unit in the develo
... Show MoreThe treasury bills one internal government debt instruments in iraq that were used to finance temporary deficits in the government budget, There fore the government resorted to issuing for the purpose of providing liquidity, As well as to invest in productive progects, After that it was financing the budget deficit by the monetary authovity of the central baalpennek [the new cash velease] which led to negative effects on the Iraqi econome, Thus we find that the treasury transfers have formed alarge proportion of the gross domestic government debt to finance the deficit ayear ago 2003. &nbs
... Show MoreThe main purpose of the research is to diagnose the importance of the role that strategic memory plays with its three variables (content, structure, and processes) in helping the human resource department to use the COSO model with its five components (culture and governance, strategy and objectives, performance, communications and information, and feedback) in auditing activities and tasks Her own. As the research problem emphasized the existence of a lack of cognitive perception, of the importance of strategic memory, and the investment of its components in the rationalization of the application of the COSO model. and therefore it can be emphasized that the importance of the research is to provide treatments for problems relate
... Show MoreAbstract
Abstract has many advantages as has historically been one of the regions leading cultural centers . for centuries , it has been a center of commertial and financial operations in Iraq. it is also rich in archeological sites and natural resources, but because of its wars and implementation of urban development strategies are effective and sustainable , so contracted the secretariat of Baghdad with the company (khatib and scirntiffic) for the preparation of the comprehensive development plan for the city of Baghdad in 2030 and funded by the world bank and the fact that the plan was approved ( three stages of it ) and only one phase remains the fourth stage, which is under discussion the aim of the
... Show MoreThe study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups: a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess
... Show MoreAR Al-Heany BSc, PKESMD MSc., PSAANBS PhD, APAANMD MSc., DDV, FICMS., IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2014 - Cited by 14
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show More