The research is to identify the legend of the seven eyes amulet of Babylonian origin and the representations it carried of the link between the Babylonian past and the Islamic present presented in the design works of the promoted products, preserving its impact in the souls as a way to avoid the act of envy, and from this was the research problem that I want to get answers to, which That is (How was the legend of the seven-eyes amulet represented in the design of industrial products?), making its goal to identify how that legend was represented within the design work of marketed industrial products, and in order to reach the answer, the research presented many concepts starting with the legend in its various forms in industrial products.
... Show MoreThe aim of this paper is to design feed forward neural network to determine the effects of
cold pills and cascades from simulation the problem to system of first order initial value
problem. This problem is typical of the many models of the passage of medication throughout
the body. Designer model is an important part of the process by which dosage levels are set.
A critical factor is the need to keep the levels of medication high enough to be effective, but
not so high that they are dangerous.
The optimization calculations are made to find the optimum properties of combined quadrupole lens consist of electrostatic and magnetic lenses to produce achromatic lens. The modified bell-shaped model is used and the calculation is made by solving the equation of motion and finding the transfer matrices in convergence and divergence planes, these matrices are used to find the properties of lens as the magnification and aberrations coefficients. To find the optimum values of chromatic and spherical aberrations coefficients, the effect of both the excitation parameter of the lens (n) and the effective length of the lens into account as effective parameters in the optimization processing
Massive multiple-input multiple-output (MaMi) systems have attracted much research attention during the last few years. This is because MaMi systems are able to achieve a remarkable improvement in data rate and thus meet the immensely ongoing traffic demands required by the future wireless networks. To date, the downlink training sequence (DTS) for the frequency division duplex (FDD) MaMi communications systems have been designed based on the idealistic assumption of white noise environments. However, it is essential and more practical to consider the colored noise environments when designing an efficient DTS for channel estimation. To this end, this paper proposes a new DTS design by exploring the joint use of spatial channel and n
... Show MoreAbstract:
Due to the importance of technology and the accompanying changes of the environment affecting companies that use the technology mainly in their work, especially as most companies live in an unstable dynamic environment, which motivated the researchers to choose the International Company for smart card (Keycard) as a field of research and find ways to them to face Those changes.
The problem of the study was "limited attention to the components of technological change", which included research and development, innovation and information technology, which had an impact on the design decisions of the process (process selection, cust
... Show MoreMany designs have been suggested for unipolar magnetic lenses based on changing the width of the inner bore and fixing the other geometrical parameters of the lens to improve the performance of unipolar magnetic lenses. The investigation of a study of each design included the calculation of its axial magnetic field the magnetization of the lens in addition to the magnetic flux density using the Finite Element Method (FEM) the Magnetic Electron Lenses Operation (MELOP) program version 1 at three different values of current density (6,4,2 A/mm2). As a result, the clearest values and behaviors were obtained at current density (2 A/mm2). it was found that the best magnetizing properties, the high
... Show MoreThe research discussed the topic of the functional role of responsive materials in being elements of a functional transformation in the design of industrial products, based on the study of the structures of smart materials and their performance capabilities at the level of action and self-reaction that characterize this type of materials.
Basic features of responsive materials have been identified to be elements of self-functional insertion into the industrial product design, which contributes to raising the efficiency and functional capacity of the industrial product and enhancing the ability of products to perform self-acting interactions in the structural structure of the material structure of the product and its ability to res
... Show MoreIn this paper, a solar concentrator is designed in the form of a concave half-cylindrical mirror consisting of polygonal reflective surface plates. The plates are arranged to give a hemispherical shape to the design. These surfaces work to receive solar radiation and focusing by reflecting it to the receiver that is placed in front of the reflecting surfaces. The results are compared with a system consisting of a concave reflecting surface of the same dimensions to obtain a good criterion for evaluating the design performance. The results showed a low acceptance angle for the design for all the samples used due to the geometrical design nature. The optical efficiency affected by the angle of incidence greatly by
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More