The research discussed the propositions of functional structures and the requirements for their transformation according to the variables of use and human interaction through the variables of functions with one form products، multifunctional variables، and transforming form in one product. The patterns of user’s interaction with products were discussed through the variables of functional type، starting from defining the types of functions in the industrial product structures to: practical functions، which were classified into: informational functions، ergonomic functions، use، handling، comfort، global، anthropometric adaptation and physical postures. While the interaction variables were discussed according to the meaning function based on the symbolic meaning that the user attributes to the product design، which were categorized into: cultural (relational)، social and personal (emotional). As well as the function of maintaining trust and social function، which has been categorized into: the relational function، the communication and identification function، the remembering function، the function stemming from the necessity of daily interaction، the economic function، the self-activation function، and the aesthetic function، which is determined by finding specific pleasures for the user، which are classified as follows: Physical pleasure، social pleasure، psychological pleasure and intellectual pleasure. The aesthetic function of the product can be analyzed according to elements of: shape، material، surface and color. And on the discussion of the variables of user interaction of the functional type، a number of conclusions were reached that were، in total، an objective analysis of the relationships of functions with each other and how the functional type was affected by the contexts and requirements of user interaction and the transformation of functional structures based on the necessities of physical، intellectual and emotional interaction، within the framework of Total user experience.
Histone deacetylase inhibitors with zinc binding groups often exhibit drawbacks like non-selectivity or toxic effects. Thus, there are continuous efforts to modify the currently available inhibitors or to discover new derivatives to overcome these problems. One approach is to synthesize new compounds with novel zinc binding groups. The present study describes the utilization of acyl thiourea functionality, known to possess the ability to complex with metals, to be a novel zinc binding group incorporated into the designed histone deacetylase inhibitors. N-adipoyl monoanilide thiourea (4) and N-pimeloyl monoanilide thiourea (5) have been synthesized and characterized successfully. They showed inhibition of growth of human colon adenoc
... Show MoreThe purpose of this research is to identify heritage and highlight its value by drawing on its decorative vocabulary and integrating it with the Arabic calligraphy to revive the heritage in a contemporary style, and to create decorative design units inspired by Sadou and Arabic calligraphy and to employ them in the modern fashion designs. The applied descriptive approach has been used in this research, and the research community is made of women in Riyadh area. The tools used in this research were the questionnaire and the observation. The most important results of the research are: the design of decorative units from the integration of Arabic calligraphy and the decorations of the Saduo, and the use of these units in the design of the o
... Show MoreThe constructed building in the urban area is subject to wind characteristics due to the influence of surrounding buildings. The residential complexes currently being built in Iraq represent a case study for the subject of this research. Therefore, the objective of this study is to identify the interference effect because of adjacent buildings effects on the mid-rise building. The speed and pressure of the wind have been numerically simulated as well as wind load has been simulated by using a virtual wind tunnel which is available in Autodesk Robot Structural Analysis, RSA, software. Two identical adjacent buildings have been simulated and many coefficients were included in this study such as the spacing, directionality,
... Show MoreIn this paper, a discussion of the principles of stereoscopy is presented, and the phases
of 3D image production of which is based on the Waterfall model. Also, the results are based
on one of the 3D technology which is Anaglyph and it's known to be of two colors (red and
cyan).
A 3D anaglyph image and visualization technologies will appear as a threedimensional
by using a classes (red/cyan) as considered part of other technologies used and
implemented for production of 3D videos (movies). And by using model to produce a
software to process anaglyph video, comes very important; for that, our proposed work is
implemented an anaglyph in Waterfall model to produced a 3D image which extracted from a
video.
This paper describes theoretical modeling of electrostatic mirror based on two cylindrical electrodes, A computational investigation has been carried out on the design and properties of the electrostatic mirror. we suggest a mathematical expression to represent the axial potential of an electrostatic mirror. The beam path by using the Bimurzaev technique have been investigated as a mirror trajectory with the aid of Runge – Kutta method. the electrode shape of mirror two electrode has been determined by using package SIMION computer program . The spherical and chromatic aberrations coefficients of mirror has been computed and normalized in terms of the focal length. The choice of the mirror depends on the op
... Show MoreFinancial fraud remains an ever-increasing problem in the financial industry with numerous consequences. The detection of fraudulent online transactions via credit cards has always been done using data mining (DM) techniques. However, fraud detection on credit card transactions (CCTs), which on its own, is a DM problem, has become a serious challenge because of two major reasons, (i) the frequent changes in the pattern of normal and fraudulent online activities, and (ii) the skewed nature of credit card fraud datasets. The detection of fraudulent CCTs mainly depends on the data sampling approach. This paper proposes a combined SVM- MPSO-MMPSO technique for credit card fraud detection. The dataset of CCTs which co
... Show MoreThe searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time. Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle to involve four types of binary code books (i.e. Pour when , Flat when , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding procedure, with very small distortion per block, by designing s
... Show More