Researches in the field of evaluation of industrial products emotionally are internationally new and non-existing in the Arabic speaking countries, which is considered the crux of the problem in the current research, in addition to the need of the designers and design students to know how to measure the emotional responses for the industrial product in order to get benefit from them in their designs. The research objective is to get a tool that uses emojis in measuring the emotional responses for the products. The researcher designed an emotional verbal wheel and emojis wheel. The sample of the research consisted of (7) chairs different in design and use, and the respondents were (89) students. The most important results are:
1- Designing the sensory emotional circuit by the use of emojis.
2- Reaching at a sensory emotional description for the study samples
in his Diwan, and standing on them, and determines This study dealt with the lexical and semantic fields in the sentimental poems in Walid Hussein's Diwan (I do not desire to whisper the question) that the classification
The origin of this technique lies in the analysis of François Kenai (1694-1774), the leader of the School of Naturalists, presented in Tableau Economique. This method was developed by Karl Marx in his analysis of the Departmental Relationships and the nature of these relations in the models of " "He said. The current picture of this type of economic analysis is credited to the Russian economist Vasily Leontif. This analytical model is commonly used in developing economic plans in developing countries (p. 1, p. 86). There are several types of input and output models, such as static model, mobile model, regional models, and so on. However, this research will be confined to the open-ended model, which found areas in practical application.
... Show MoreOne technique used to prepare nanoparticles material is Pulsed Laser Ablation in Liquid (PLAL), Silver Oxide nanoparticles (AgO) were prepared by using this technique, where silver target was submerged in ultra-pure water (UPW) at room temperature after that Nd:Yag laser which characteristics by 1064 nm wavelength, Q-switched, and 6ns pulse duration was used to irradiated silver target. This preparation method was used to study the effects of laser irradiation on Nanoparticles synthesized by used varying laser pulse energy 1000 mJ, 500 mJ, and 100 mJ, with 500 pulses each time on the particle size. Nanoparticles are characterized using XRD, SEM, AFM, and UV-Visible spectroscopy. All the structural peaks determined by the XRD
... Show MoreSchools and artistic trends derive their themes from artistic styles and styles as methods followed by the artist to express his themes embodied in the values of artistic and plastic elements as symbols and signs that can be described according to the type of art school and the extent to which the artist is influenced in employing them as a goal to achieve the plastic achievement in the painting, and from those vocabulary (human beings nature Life) as encoded messages that have an appearance and an interior, the appearance of which are forms, colors, formats and distributions of space and their interior meanings and semantics embody attitudes, events and circumstances that stem from the social depth and daily life and derive their comp
... Show MoreSteganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show More