NAA Mustafa, University of Sulaimani, Ms. c Thesis, 2010 - Cited by 4
What concerns the research is employing the modern technology in a compatible way, because it has multiplied with the visual working functions and has grown in a special way with the development of the digital graphic design field which represents a crystallization product according to investigation and experimentation mechanism within the field of the scientific research in the design field and development of the skills of the first designing worker, who always seeks to find working and functional structures in order to produce a design with a clear meaning by utilizing the technological abilities including the acoustic tech
... Show MoreResearch on sustainable design in Iraqi craft industries and ways to develop them is essential to preserving the cultural heritage and authenticity of these industries while promoting environmentally sustainable practices. Lack of access to modern technologies, knowledge and resources may hinder the growth of these industries and their ability to compete in the global market. The research problem revolves around finding ways to develop sustainable design in the Iraqi craft industries. The expected outcomes of this research include a clear definition of sustainable design, understanding the history of sustainable design in the craft industry, identifying different types of craft industries in Iraq, exploring the basic concepts of sustaina
... Show MoreThis research discusses the subject of emotional stimulation factors through the stages of product design interaction with the consumer and what they reflect in the formation of a self-consideration of the design in his emotional memory regarding the specific brand through the following question (What is the emotional stimulus in the design of certain products and its reflection on the consumer during the processes of receiving and using it?), The importance of the research comes in the connection of design elements with many sensory factors used and motivating to attract the consumer to the acquisition of a specific design and the demand for its experience, the study aims Detection and access to emotional stimulation in the design of th
... Show MoreThe research discussed the role of interrelationships between the product attributes and the individual identity of the brand and the user, starting from reviewing the identity concepts in the general design propositions and the identity from the industrial design perspective, and highlighting the role of the attributes in identifying the individual identity of the product, which would enable the user to adopt them to be representative of his identity, starting from identifying the importance of the identity being characterized by three major elements: innovating products in the user's viewpoint, viewing the user's environment, the methodology of the design language, and identifying the identity attributes in the industrial product start
... Show MoreEarth dams are constructed mainly from soil. A homogenous earth dam is composed of only one material. The seepage through such dams is quite high. Upstream impervious blanket is one of the methods used to control seepage through the dam foundations. Bennet's method is one of the commonly used methods to design an impervious upstream blanket. Design charts are developed relating the length of blanket, total reservoir head, total base width of the dam (excluding downstream drainage), the coefficient of permeability of the blanket material, blanket thickness, foundation thickness, and coefficient of permeability of the foundation soil, based on the equations governing the Bennet's method for a homogenous earth dam with a blanket of uniform
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show More