The style of Free-form Geometry (FFG) has emerged in contemporary architecture within the last three decades around the world through the progress of digital design tools and the development of constructive materials. FFG is considered as the hard efforts of several contemporary architects to release their products from familiar restrictions to discover new and unfamiliar styles under the perspective of innovation. Many contemporary architects seek to recognize their forms and facilitate dealing with according to specific dimensional rules. The main research problem is the lack of knowledge, in the field of architecture, in previous literature about the formation processes in achieving FFG in contemporary architecture as a response to the new requirements that make architecture more flexible in the final expression and breaking away from regularity. Thus, this paper aims to establish a theoretical framework to determine dimensional rules as formation techniques and utilize them as tools in designing processes, to finally benefit to attain several free-form geometries in architecture now and in the future. The research results confirm the importance of dimensional rules in the designing processes as an effective contribution to achieving FFGs in contemporary architecture.
مدة تولي رئاسة السلطة في الفكر السياسي الاسلامي المعاصر
The Skyrme–Hartree–Fock (SHF) method with MSK7 Skyrme parameter has been used to investigate the ground-state properties for two-neutron halo nuclei 6He, 11Li, 12Be and 14Be. These ground-state properties include the proton, neutron and matter density distributions, the corresponding rms radii, the binding energy per nucleon and the charge form factors. These calculations clearly reveal the long tail characterizing the halo nuclei as a distinctive feature.
Simulation of free convection heat transfer in a square enclosure induced by heated thin plate is represented numerically. All the enclosure walls have constant temperature lower than the plate’s temperature. The flow is assumed to be two-dimensional. The discretized equations were solved stream function, vorticity, and energy equations by finite difference method using explicit technique and Successive Over- Relaxation method. The study was performed for different values of Rayleigh number ranging from 103 to 105 for different angle position of heated thin plate(0°, 45°, 90°). Air was chosen as a working fluid (Pr = 0.71). Aspect ratio of center of plate to the parallel left wall A2
... Show MoreThe aim of the research is to identify the extent of the direct and indirect relationship of the population growth of the cities as a result of the urbanization process witnessed by the Arab region for the urban development of the city structures and their formative structures, changing the planning criteria of some cities and the extent of their changes in spatial and temporal dimensions and their relation to the standards of the western cities. In changing the concept of the modern Arab city, such as the emergence of new functional uses affecting the change in the pattern of formal formations of its urban fabric associated with its ancient morphology and distinctive human nature. The research seeks to identify the extent to which plann
... Show More In this research study, I tried to trace the epic effect to learn how it was understood and how it was used. Following the descriptive and analytical approach in the research, the first chapter dealt with a presentation of the methodological framework of the problem, the goal, the limits of the research, the importance and the need for it and the definition of terms, as well as the theoretical framework which consisted of two topics, including the impact of the epic theater on the world theater and the second the effect of the epic theater on the Arab theater, This came by tracing the epic impact on the world stage of the Greeks, the Middle Ages, the Renaissance, and the Arab theater of the twentieth century.
As for the second
Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreThe propagation of laser beam in the underdense deuterium plasma has been studied via computer simulation using the fluid model. An appropriate computer code “HEATER” has been modified and is used for this purpose. The propagation is taken to be in a cylindrical symmetric medium. Different laser wavelengths (1 = 10.6 m, 2 = 1.06 m, and 3 = 0.53 m) with a Gaussian pulse type and 15 ns pulse widths have been considered. Absorption energy and laser flux have been calculated for different plasma and laser parameters. The absorbed laser energy showed maximum for = 0.53 m. This high absorbitivity was inferred to the effect of the pondermotive force.