The concept of social graphic design is one of the most critical areas that highlight the designer's knowledge of social responsibility by employing design skills in community awareness. This study focused on defining social graphic design, the meaning, practices, and strategies for designing awareness posters. This study reviewed two examples of awareness posters that reflect the Saudi designer's practices. The results summarized that social graphic design is a concept not taught directly but gained from permanent practice in designing awareness posters that interact with community issues. The designer's understanding of his social events and their sensing in the visual form of a poster reflects the designer's social awareness. Social g
... Show MoreThis paper introduces a complete design and simulation of a controller for the double fed induction generator (DFIG) turbine. The work also included the solar updraft tower (SUT) design to supply Al-Mahmoudia hospital in Baghdad/Iraq. The design includes the daily average load estimation, annual solar irradiance and, temperature monitoring, and logging.
According to the data obtained from the Ministry of Science and Technology, Baghdad has low wind speed. Therefore, the (SUT) has been designed to generate electrical power depending on the difference between the external and internal air temperature. The temperature difference will generate a suitable airspeed to drive the wind turbine, connected to the proposed (DFIG) generators
... Show MoreThis study includes design and synthesis of new non-steroidal anti-inflammatory agents (NSAIDs) with expected cyclooxygenase-2 (COX-2) selective inhibition to achieve better activity and low gastric side effects. Two series of compounds have been designed and synthesized as potential NSAIDs,these are: Salicylamide derivatives (compounds 3,4,5 ) and Diflunisal derivatives (compounds 10&11). In vivo acute anti-inflammatory effect of one of the synthesized agents (compound 3) was evaluated in the rat using egg-white induced paw edema model of inflammation. Preliminary pharmacological study revealed that compound 3 exhibited less anti-inflammatory effect compared to that of aspirin after
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called