Preferred Language
Articles
/
fheNZo4BVTCNdQwCy0bi
Structural Design According to Constructal Theory in Architecture
...Show More Authors
Abstract<p>Constructal theory plays a major role in the conceptual design stage of the structural system in architecture. It provides a conceptual framework for predicting the form depending on natural systems to model those systems geometrically according to the constructal law that works in two directions: the first is towards predicting the general form of the structural system, and the second is the physical application of the law in the process of detailed design of the parts of the system. The aim of this paper is to determine the mechanism adopted in the structural design according to the constructal theory, assuming that the structural design according to the constructal theory achieves high structural efficiency. The paper depends in its theoretical framework on the clarification of the concepts of constructal theory, the mechanism of constructal law work, and then the verification of its compliance with the applicable rules to achieve high efficiency. The paper concludes a set of indicators that can be adopted in assessing the level of structural efficiency - at the level of form and material - of architecturally designed structures according to the constructal theory. The research concluded that constructal theory contributes significantly to research on the origins of living systems, and to employ them in the process of creating the architectural form on one hand, and enhancing the structural efficiency of the structural performance on the other hand.</p>
Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Iraqi Journal Of Physics
Effect of Zinc (Zn) -Doped on the Structural, Optical and Electrical Properties of (Cdo)1-Xznx Films Prepared by Pulsed Laser Deposition Technique
...Show More Authors

Pure cadmium oxide films (CdO) and doped with zinc were prepared at different atomic ratios using a pulsed laser deposition technique using an ND-YAG laser from the targets of the pressed powder capsules. X-ray diffraction measurements showed a cubic-shaped of CdO structure. Another phase appeared, especially in high percentages of zinc, corresponding to the hexagonal structure of zinc. The degree of crystallinity, as well as the crystal size, increased with the increase of the zinc ratio for the used targets. The atomic force microscopy measurements showed that increasing the dopant percentage leads to an increase in the size of the nanoparticles, the particle size distribution was irregular and wide, in addition, to increase the surfac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Thu Oct 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
ENGLISH FOR SPECIFIC PURPOSES (ESP) AND SYLLABUS DESIGN
...Show More Authors

This research has discussed the origins of ESP, addressed key notions about ESP and examined issues in ESP syllabus design. The content of the paper was determined by a need identified based on my  experience as an ESL instructor designing and delivering the content-based language program - Language Preparation for the Cadets and Employment in the Iraqi  College of Police . These issues, where possible, have been supported by current and pertinent academic literature. It is my sincerest hope that these observations will lend insight into the challenges facing the ESL instructor acting as ESP syllabus developer.

View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Microprocessors And Microsystems
Design considerations for a microprocessor-based Doppler radar
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jun 12 2013
Journal Name
International Journal Of Computer Applications
Design and Implementation of a Practical FTTH Network
...Show More Authors

Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2010
Journal Name
Al-kindy College Medical Journal
Towards More Objective Teaching Curriculum Design and Development
...Show More Authors

have been notable developments in the field of
r.ldical education in the country and in the region.
The most significant of which is a general awarness
that has been created about the need for and
relevance of changes.There is however a basic
question that posses itself and becomes clearly
relevant
in the context of effort .Today, to recognize health
care services in the developing countries in the light
of realigned priorities This ensure to bring about
learning outcomes as a tocurriculum changes to meet
this demand.

View Publication Preview PDF
Publication Date
Fri Mar 15 2024
Journal Name
2024 International Conference On Distributed Computing And Optimization Techniques (icdcot)
Reconfigurable Microstrip Antenna Design Fifth Generation (5G) System
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Shield Calculation Design for gamma-ray sterilzer plant
...Show More Authors

The present calculation covers the building shield during irradiation process and under water storage of three milion curries Cobalt-60 radiation source the calculation results in design requirement of 8m depth of water in the source stoeage pool

View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
GNSS Baseline Configuration Based on First Order Design
...Show More Authors

The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution  of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.

FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic

... Show More
View Publication
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF