The design was distinguished in Late Twenty-First Century With new and new methods Through which the ability to adapt all technical media in the formation of two-dimensional and three-dimensional figures and shapes was achieved .
Which led to the emergence of endless sets of design ideas characterized by the heterogeneity of design forms and design solutions that preceded it. The designer could not access these creations in various architectural and artistic fields only through computer programs, especially those related to the activation of mathematical logic and what is known as algorithms in the formation and construction of the form, which led to the emergence of the "parametric direction" and the problem of research is summarized in the extent of the influence of parametric on the design The research aims to shed light on the emergence of parameter to shed light on the concept of parameter and its tools the research takes the approach (descriptive and analytical) spatial boundaries of some countries of the world, for example, but not limited to since the appearance of parameter until now, and the researcher offered a formative reading of some objects Museum parametric sculpture and a formative reading of some parametric sculptural objects in the open air One of the results of the research is that the sculptor, through the use of parametric, is able to design works for display internally in facilities or externally in squares and gardens, and that the parametric artist has knowledge of the elements that must be taken into account when designing models for museum display or garden display and outdoors, and the researcher recommends the need to pay attention to contemporary techniques in the field of Arts and direct scientific research in the field of Arts in general and sculpture in particular to discuss recent developments and discoveries in the fields of design and implementation of models in different countries of the world.
Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreThere is a continuous and massive need for newer cephalosporins that should have resistance against β-lactamases and can be used orally. An approach of using cephalexin, as a well-studied and potent antibacterial compound is considered to prepare new designed derivatives. These derivatives include the incorporation of amino acid moiety linked through an amide bond with the α-amino group of cephalexin. Certain aliphatic amino acids were used, such as glycine, alanine, valine and proline. The chemical structures of these derivatives were confirmed by IR spectroscopy and elemental analyses. All the synthesized compounds were subjected for preliminary evaluation of antimicrobial activity using well diffusion method, against certa
... Show MoreMultimedia is one of the most important elements of modern educational media and must be used in educational websites in order to disseminate knowledge on a large scale and should be used to provide scientific information to all, as the current research tried to explore the possibilities of employing them in the design of educational websites and highlight their role in promoting the scientific aspects of the user. This study included four axes, the first of which was devoted to the introduction which includes the problem of research, its importance, objectives and its objective, temporal and spatial limitations, which were limited to the study of the main pages of Arabic educational websites published in 2019. The second axis contained th
... Show MoreCircular data (circular sightings) are periodic data and are measured on the unit's circle by radian or grades. They are fundamentally different from those linear data compatible with the mathematical representation of the usual linear regression model due to their cyclical nature. Circular data originate in a wide variety of fields of scientific, medical, economic and social life. One of the most important statistical methods that represents this data, and there are several methods of estimating angular regression, including teachers and non-educationalists, so the letter included the use of three models of angular regression, two of which are teaching models and one of which is a model of educators. ) (DM) (MLE) and circular shrinkage mod
... Show MoreThe objective of this research paper is two-fold. The first is a precise reading of the theoretical underpinnings of each of the strategic approaches: "Market approach" for (M. Porter), and the alternative resource-based approach (R B V), advocates for the idea that the two approaches are complementary. Secondly, we will discuss the possibility of combining the two competitive strategies: cost leadership and differentiation. Finally, we propose a consensual approach that we call "dual domination".
In this work, a step-index fiber with core index and cladding index has been designed. Single-mode operation can be obtained by using a fiber with core diameters 4–13 µm operating at a wavelength of 1.31 µm and by 4–15 µm at 1.55 µm. The fundamental fiber mode properties such as phase constant, effective refractive index, mode radius, effective mode area and the power in the core were calculated. Distributions of the intensity and the amplitude were shown.
Sub-threshold operation has received a lot of attention in limited performance applications.However, energy optimization of sub-threshold circuits should be performed with the concern of the performance limitation of such circuit. In this paper, a dual size design is proposed for energy minimization of sub-threshold CMOS circuits. The optimal downsizing factor is determined and assigned for some gates on the off-critical paths to minimize the energy at the maximum allowable performance. This assignment is performed using the proposed slack based genetic algorithm which is a heuristic-mixed evolutionary algorithm. Some gates are heuristically assigned to the original and the downsized design based on their slack time determined by static tim
... Show MoreAbstract The relative pronoun in Hebrew language is an important pronoun use anciently and recently, it developed and it's usage and meanings differed so, it was not confined to the particle "אֲשֶׁר" as a relative pronoun, but beside it appeared other pronouns giving the relative meaning. Hence, the topic of this research was on this basis through studying the relative pronouns in old and modern Hebrew, the way of using them and their connection with preposition particles, as well as studying the relative clause.
In this article, we investigate a mathematical fractional model of tuberculosis that takes into account vaccination as a possible way to treat the disease. We use an in-host tuberculosis fractional model that shows how Macrophages and Mycobacterium tuberculosis interact to knowledge of how vaccination treatments affect macrophages that have not been infected. The existence of optimal control is proven. The Hamiltonian function and the maximum principle of the Pontryagin are used to describe the optimal control. In addition, we use the theory of optimal control to develop an algorithm that leads to choosing the best vaccination plan. The best numerical solutions have been discovered using the forward and backward fractional Euler
... Show More