The goal of the research is to find the optimization in the test of the appropriate cross-over design for the experiment that the researcher is carrying out (under assumption that there are carry-over effects of the treatments) to posterior periods after the application period (which is often assumed to be the first period). The comparison between the double cross-over design and the cross-over design with extra period. The similarities and differences between the two designs were studied by measuring the Relative Efficiency (RE) of the experiment.
With a descriptive and analytical approach, it discusses the concept of phenomenology as an approach to seeing the aesthetics of ugliness as one of the concepts associated with the aesthetic experience in contemporary art designs, as it is the result of communication between artistic production and the recipient, which leads to creating a state of aesthetic pleasure. A phenomenological method is used to uncover the aesthetics of ugly and to connect ugliness and beauty since ugliness in aesthetics incorporates beauty as a modern aesthetic vision from the phenomenological perspective. The study investigated aesthetics as a phenomenon of perception, sensory knowledge, and the aesthetic response to the production of designs in contemporary a
... Show MoreThe traditional technique of generating MPSK signals is basically to use IQ modulator that involves analog processing like multiplication and addition where inaccuracies may exist and would lead to imbalance problems that affects the output modulated signal and hence the overall performance of the system. In this paper, a simple method is presented for generating the MPSK using logic circuits that basically generated M-carrier signals each carrier of different equally spaced phase shift. Then these carriers are time multiplexed, according to the data symbols, into the output modulated signal.
Ad-Hoc Networks are a generation of networks that are truly wireless, and can be easily constructed without any operator. There are protocols for management of these networks, in which the effectiveness and the important elements in these networks are the Quality of Service (QoS). In this work the evaluation of QoS performance of MANETs is done by comparing the results of using AODV, DSR, OLSR and TORA routing protocols using the Op-Net Modeler, then conduct an extensive set of performance experiments for these protocols with a wide variety of settings. The results show that the best protocol depends on QoS using two types of applications (+ve and –ve QoS in the FIS evaluation). QoS of the protocol varies from one prot
... Show MoreNo country in the world has an ancient heritage of its own. It represents the product of the civilizations left behind by previous eras. It represents the development of urban life and its capital of the interest of its people in the field of construction and reconstruction. The urban heritage and its associated arts may seem to be a material heritage at first glance, but it is not free from the spiritual side. Therefore, the nations in different parts of the earth cherish it and care for it with all due diligence, because it mixes with its history, memories and emotions.
This research discusses the use of local environment materials in the production of urban fabric constituents. I
The accuracy of the Moment Method for imposing no-slip boundary conditions in the lattice Boltzmann algorithm is investigated numerically using lid-driven cavity flow. Boundary conditions are imposed directly upon the hydrodynamic moments of the lattice Boltzmann equations, rather than the distribution functions, to ensure the constraints are satisfied precisely at grid points. Both single and multiple relaxation time models are applied. The results are in excellent agreement with data obtained from state-of-the-art numerical methods and are shown to converge with second order accuracy in grid spacing.
تم تقييم المعرفة والوعي تجاه داء الكريبتوسبوريديوس في هذه الدراسة خلال الفترة من أبريل 2009 حتى يونيو 2011 ، من بين 188 شخصًا من كلا الجنسين تم تقسيمهم إلى مجموعات ومجموعات فرعية مختلفة على النحو التالي المجموعة 1: تشمل 48 طبيبًا من مختلف المستشفيات والرعاية الصحية الأولية مراكز في بغداد تم تقسيم هذه المجموعة إلى 30 طبيبًا متخصصًا و 18 طبيبًا ممارسًا عامًا. المجموعة الثانية: تضم 45 عضو هيئة تدريس من قسم الأحياء ، قس
... Show MoreKnowledge and awareness towards cryptosporidiosis were assessed in this study during the period from April 2009 till June 2011, among 188 person of both gender which were divided in different groups and sub groups as following Group 1: include 48 physician from different hospitals and primary health care centers in Baghdad this group were sub divided into 30 Specialist doctors and 18 General practitioners doctors. Group 2 : include 45 teaching staff member from Biology department , Biotechnology department in University of Baghdad and AL-Nahrain University as well as teaching staff member from the college of medicine – University of Baghdad and University of Mustansiryah, this group were sub divided into 9 Ph.D and 36 M.Sc. + B.Sc. me
... Show MoreIn this study, generation of elliptical gears with different teeth profiles of crowned involute, double circular arc (DCA), and combined (crowned involute with DCA) has been developed. The resulting mathematical equations have been computerized and feed to CNC end mill machine to manufacture elliptical gear models with different profiles. These models are investigated in plane polariscope to show the resulting stresses under certain load. Comparison of photo-elastic stress results shows that combined elliptical gears with DCA side as a loaded side have a minimum resulting contact stress with a reduction percentage of 40% compare with contact stresses in counterpart elliptical gear of involute profile (which is commonly u
... Show MoreKey generation for data cryptography is vital in wireless communications security. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the randomness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this paper, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is developed which decreases the correlation between keys generated at consecutive coherence times. When compared to the
... Show More