Over the last few years, the interior designer has been given the ability to access many innovative tools for new forms of unprecedented diversity and efficiency. Some design experts have described the new parametric procedures they are introducing to create new interior projects as a radical transformation that carries all the elements of a qualitative shift in interior design. The best of these parametric procedures is the technical capabilities offered by us to create new forms that are different from what has been discussed in everything that has been produced by designers and architects since modernity and even before it to the present time, which returns our design products through a series of computer programs that perform the processes that Simulates selective ecology of nature. However, it is wrong to believe that these parametric programs can be unconditionally loaded with a manager who controls their inputs and outputs. The designer is allowed to release them properly, let alone optimize them, and solve complex design issues without interference from the interior designer. Critical stages of the design process. Failures to intervene, adapt, or simply understand the algorithms given characteristics of the innovative form. Is entirely responsible for an unfortunate series of interior optimization and computerized systems analysis produced by the field of design so far. One thing that is clear to us is the definite convergence that takes place between interior design and other engineering disciplines, facilitated on the basis of data exchange through parametric modeling programs. The purpose of this research is to find creative approaches that celebrate the symbiotic and inevitable relationship in our present day between the interior designer and the computer. Founded by research and experimentation of a new dynamic method called parametricism characterized by its aesthetic effects in the interior design in the third millennium than previous movements and techniques producing the new form is certainly unprecedented.
Due to the development that occurs in the technologies of information system many techniques was introduced and played important role in the connection between machines and peoples through internet, also it used to control and monitor of machines, these technologies called cloud computing and Internet of Things. With the replacement of computing resources with manufacturing resources cloud computing named converted into cloud manufacturing.
In this research cloud computing was used in the field of manufacturing to automate the process of selecting G-Code that Computer Numerical Control machine work it, this process was applied by the using of this machine with Radio Frequency Identification and a AWS Cloud services and some of py
... Show MoreBroyden update is one of the one-rank updates which solves the unconstrained optimization problem but this update does not guarantee the positive definite and the symmetric property of Hessian matrix.
In this paper the guarantee of positive definite and symmetric property for the Hessian matrix will be established by updating the vector which represents the difference between the next gradient and the current gradient of the objective function assumed to be twice continuous and differentiable .Numerical results are reported to compare the proposed method with the Broyden method under standard problems.
In this paper, a computational method for solving optimal problem is presented, using indirect method (spectral methodtechnique) which is based on Boubaker polynomial. By this method the state and the adjoint variables are approximated by Boubaker polynomial with unknown coefficients, thus an optimal control problem is transformed to algebraic equations which can be solved easily, and then the numerical value of the performance index is obtained. Also the operational matrices of differentiation and integration have been deduced for the same polynomial to help solving the problems easier. A numerical example was given to show the applicability and efficiency of the method. Some characteristics of this polynomial which can be used for solvin
... Show MoreA metal-assisted chemical etching process employing p-type silicon wafers with varied etching durations is used to produce silicon nanowires. Silver nanoparticles prepared by chemical deposition are utilized as a catalyst in the formation of silicon nanowires. Images from field emission scanning electron microscopy confirmed that the diameter of SiNWs grows when the etching duration is increased. The photoelectrochemical cell's characteristics were investigated using p-type silicon nanowires as working electrodes. Linear sweep voltammetry (J-V) measurements on p-SiNWs confirmed that photocurrent density rose from 0.20 mA cm-2 to 0.92 mA cm-2 as the etching duration of prepared SiNWs increased from 15 to 30 min. The
... Show MoreIn this study predication of crop coefficient (Kc) values through growing season for cucumber plant was conducted. A field experiment was carried out at AL Yusufiyah Township, in the Governorate of Baghdad, (latitude: 33°09' N, longitude: 44°24' E, and altitude: 34 m) in medium loam soil. The plant was cultivated inside the greenhouse under subsurface trickle irrigation system with soil water retention technology (SWRT) during the growing season 2017. Crop coefficient values were guessed from the direct method of measurements of daily crop evapotranspiration, while reference evapotranspiration was obtained from Agricultural Meteorology Project - Station of Baghdad - Abu-Ghraib. The obtained results were showed that crop coeffici
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreThe research aims to investigate the effects of GMAW or MIG welding process on the mechanical properties of dissimilar aluminum alloys 2024-T351 and AA 6061- T651. A series of experimental techniques have been conducted to evaluate mechanical properties of the alloys, by carrying out hardness, tensile and bending tests for welded and un-welded specimens.
Metal inert gas (MIG) has been carried out on sheet metal using ER- 4043(AlSi5) as a filler metal and argon as shielded gas. The welded joints were tested by X-ray radiography and Faulty pieces were excluded.
Welding joints without defects are subjected to heat treatment including heating the joints in furnace to 170 °C for half an hour then air cooling to rel
... Show MoreWith the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show More