The current research discussed biophysics data as a theoretical and applied knowledge base linking industrial design with the natural sciences at the level of applied strategies through which we can enrich the knowledge base of industrial design. The research focused on two main aspects of the scientific references for biophysics, namely: electromagnetism, and biomechanics. According to the performance and functional applications in designing the functions of industrial products at the electromagnetic level, it was found that remote sensing applications: such as fire sensors that were adopted from the insect (Black Beetle) and that their metaphors enable them to hear fire, and collision sensors, which were adopted from the insect (locust) , And its ability to fly in large swarms without colliding with one another, and the location echo sensors that were adopted from (bats), which moves without having a sense of sight, and sound sensors that were adopted from (dolphins). we found that all of these biological features broadened the designer’s understanding of the biological world, and the breadth of knowledge base of industrial designer, which enabled him to design products bearing solutions to problems that were not easily solved without understanding the biological structures of these organisms. In terms of biomechanics, it was found that the processes of analyzing and interpreting the nature and structures of humans and insects, according to the nature of the mechanical structures of each of them, enabled the designer to find many types of products based on adopting the nature of the structural composition of these organisms, which strengthened the possibility of physical application of New ideas and solutions to problems that were not easy to solve without a good understanding of what biophysics is and how living things interact in their natural environments.
Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the
... Show MoreVariable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio
Directional control valves are designed to control direction of flow, while actuators maintain required speeds and precise positions. Magnetorheological (MR) fluid is a controllable fluid. Utilizing the MR fluid properties, direct interface between magnetic fields and fluid power is possible, without the need for mechanical moving parts like spools. This study proposes a design of a four-way three-position MR directional control valve, presents a method of building, and explains the working principle of the valve. An analysis of the design and finite elements using finite element method of magnetism (FEMM) software was performed on each valve. The magnetic circuit of the MR valve was analyzed and the performance was simulated. The
... Show MoreThe objective of the present study is to determine the nature and direction of the correlation between mathematical excellence and learning styles as defined by the Entwistle, model in fifth-grade scientific female students. The descriptive correlational approach was implemented by the two researchers to accomplish the research objectives. A scale was developed to assess the learning styles of female students in the sample in accordance with the Entwistle, model. : (Knowledge, understanding, application, analysis, synthesis, evaluation, systematic thinking, creativity), and the research community was determined by the female students of the scientific fifth grade in the morning preparatory and secondary schools of the General Direct
... Show MoreAbstract
The study of oxygen mass transfer was conducted in a laboratory scale 5 liter stirred bioreactor equipped with one Rushton turbine impeller. The effects of superficial gas velocity, impeller speed, power input and liquid viscosity on the oxygen mass transfer were considered. Air/ water and air/CMC systems were used as a liquid media for this study. The concentration of CMC was ranging from 0.5 to 3 w/v. The experimental results show that volumetric oxygen mass transfer coefficient increases with the increase in the superficial gas velocity and impeller speed and decreases with increasing liquid viscosity. The experimental results of kla were correlated with a mathematical correlation des
... Show MoreThe importance of this research came through the question: Are there a privacy in the design in the ceramic arts, what are they? What are the basis of design for the ceramic art sculptures?The study refers to the design privacy in the contemporary ceramic arts, not as a serviceable art, but the art of being a dialectic collecting the arts across the craft and compositionThis research is the first study to look at the privacy of design and the connection with the formation of the large sizes ceramic art sculptures, and what they have as privacy of design and the way of formations.To highlight on the most prominent technical problems facing the ceramist in the production of so sculptural worksThe need for the study comes to help the worker
... Show MoreCloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreThe deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show More