That researchers in the play Science Find a theatrical form of an experimental creative, and these experiences taken from the innovation space aesthetic dialogue with the receiver, especially since with previous theatrical experience and is an extension of her, because the interactive theater theatrical terms that assume a pattern do from the depth of the relationship between supply playwright and the audience, which alters the receiving skills actually change, and to monitor these differing divided into three classes that include research, methodological framework (Chapter I) and includes, research problem, the importance of research and the need to him, the goal of the research, the limits Find it border, and the theoretical framework (Chapter II) and includes the first topic: the interactive theater and understandable and supporting infrastructure. And techniques, and the second section approaches the analog performance in the interactive theater traditional Chapter III, theater and includes procedures for research and presentations selected, Chapter IV of research and discussion, conclusions, recommendations and proposals results and concludes research with the most important references and sources and summary in English and reach the researcher to the group of the outcome of the most important * The interactive theater gives the recipient an opportunity ask questions inside the display to express their view and Hah as well as strengthening the revolutionary dimension of theater. * Interactive Theatre Lovers aesthetically pleasing form a new equation in the question and the answer is negative, towards clarifying question now theater and this cannot be achieved in the Aristotelian theater and his opponents
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreAbstract
In this work, diabetic glucose concentration level control under disturbing meal has been controlled using two set of advanced controllers. The first set is sliding mode controllers (classical and integral) and the second set is represented by optimal LQR controllers (classical and Min-, ax). Due to their characteristic features of disturbance rejection, both integral sliding mode controller and LQR Minmax controller are dedicated here for comparison. The Bergman minimal mathematical model was used to represent the dynamic behavior of a diabetic patient’s blood glucose concentration to the insulin injection. Simulations based on Matlab/Simulink, were performed to verify the performance of each controll
... Show MorePresent study was conducted to evaluate the different levels of energy to protein ratios (EPR) using food waste and black soldier fly larvae meal (FWBSFL) on growth performance and nutrient digestibility of broilers. A total of 160 one-day old broiler chicks were divided randomly to four groups and each group had 8 replicates with 5 chicks per replicate. The control diet was formulated using conventional feed ingredients with EPR of 154 for the starter period and 167 for the finisher period. The other treatments were diets with normal, low, and high EPR (154,143, and 166 for the starter period; 167, 155, and 177 for the finisher period) using FWBSFL. Feed consumption and body weight gain as well as digestibility of crude protein, cr
... Show MoreThis paper presents a point multiplication processor over the binary field GF (2233) with internal registers integrated within the point-addition architecture to enhance the Performance Index (PI) of scalar multiplication. The proposed design uses one of two types of finite field multipliers, either the Montgomery multiplier or the interleaved multiplier supported by the additional layer of internal registers. Lopez Dahab coordinates are used for the computation of point multiplication on Koblitz Curve (K-233bit). In contrast, the metric used for comparison of the implementations of the design on different types of FPGA platforms is the Performance Index.
The first approach attains a performance index
... Show MoreConstruction joints are stopping places in the process of placing concrete, and they are required because in many structures it is impractical to place concrete in one continuous operation. The amount of concrete that can be placed at one time is governed by the batching and mixing capacity and by the strength of the formwork. A good construction joint should provide adequate flexural and shear continuity through the interface.
In this study, the effect of location of construction joints on the performance of reinforced concrete structural elements is experimentally investigated.
Nineteen beam specimens with dimensions of 200×200×950 mm were tested. The variables investigated are the location of the construction joints
... Show MoreMobile Ad hoc Networks (MANETs) is a wireless technology that plays an important role in several modern applications which include military, civil, health and real-time applications. Providing Quality of Service (QoS) for this application with network characterized by node mobility, infrastructure-less, limitation resource is a critical issue and takes greater attention. However, transport protocols effected influential on the performance of MANET application. This study provides an analysis and evaluation of the performance for TFRC, UDP and TCP transport protocols in MANET environment. In order to achieve high accuracy results, the three transport protocols are implemented and simulated with four different network topology which are 5, 10
... Show MoreIn this study, an analytical model depending on experimental results for InPInGaAs
avalanche photodiode at low bias was presented and the characteristics of
gain for this photodiode were determined directly by the impulse response. The
model have considered the most important mechanisms contributing the
photocurrent, they are trapping, photogeneration in the undepleted region and
charge-carriers velocity due to the built-in electrical field. Also, the bandwidth
was determined as a function to the total gain of photodiode and it was mainly
determined by diffusion and trapping processes at low gain regarding to the multilayer
structure considered in this study
Photonic Crystal Fiber Interferometers (PCFIs) are greatly used
for sensing applications. This work presents the fabrication and
characterization of a relative humidity sensor based on Mach-
Zehnder Interferometer (MZI), which operates in reflection mode.
The humidity sensor operation based on the adsorption and
desorption of water vapour at the silica-air interface within the PCF.
The fabrication of this sensor is simple, it only includes splicing and
cleaving the PCF with SMF.PCF (LMA-10) with a certain length
spliced to SMF (Corning-28).
The spectrum of PCFI exhibits good sensitivity to humidity
variations. The PCFI response is observed for a range of humidity
values from (27% RH to 85% RH), the positi
