The icon and the symbol represent the constituents of the communication process, through their intellectual and philosophical concepts that have been addressed by the current research that it has touched upon their importance in conveying the design idea for the recipient and showing the specificity of each one of them in the communication process. The research problem has been limited by the following question: what are the communication roles that the symbol and the icon present for the user in designing the industrial product?
The research objective is to reveal the theoretical visualization that describes the icon and the symbol in the industrial product and its importance in the communication process through stating the of similarities and differences between them.
The research has been divided into three sections, the first of which is concerned with understanding the iconic indication intellectually, functionally and aesthetically. The second section focused on understanding the sign indication intellectually, functionally and aesthetically. The third section is concluded with the communication process concept in the industrial products through the symbols and icons.
The theoretical framework resulted in a set of indicators that have been adopted in the design of the research tool represented by the form of axes of analyzing the research sample forms. The research community is limited to the smart home appliances of (8) international companies. Then the researcher chose an intentional sample (newel, GOSONIC) and defined two different samples of their products. They have been analyzed according to the specified form for this purpose. A number of results have been extracted including: the use of symbols and icons in the design of the industrial products accomplishes the required communication process in the products in what serves the positive interaction between the industrial products and the recipients.
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreThis study aimed at highlighting the role of small and medium enterprises in bringing about economic development in Jordan. The study examined the impact of the number, size of investment and the number of jobs provided by these enterprises on the rate of growth in gross domestic product (GDP) as an indicator for economic development. To achieve its objectives, the study adopted descriptive and quantitative analysis. A linear multi regression model was developed with a growth rate of GDP as dependent variable and the number of institutions, size of investment, and the number of job opportunities as independent variables. The study concluded that each increase by one small or medium enterprise lead to an increase in the rate of gr
... Show MoreThis study aims to determine the impact of organization values as an independent variable across its dimensions (organization management values, organization mission values, relations management values, and environment management values) on achieve the strategic success which is the dependent variable and include its dimensions (environmental analysis, creative thinking, strategic decision, effective implementation, and leadership capacities). The study is conducted in the Iraq Oil Ministry. It deployed the analytical descriptive approach. It focuses on the study problem enquiries throughout addressing several principal and sub-hypothesizes in regards to cause and effect relationship. To achieve this result
... Show MoreElectronic properties including (bond length, energy gap, HOMO, LUMO and density of state) as well as spectroscopic properties such like infrared, Raman scattering, force constant, reduced mass and longitu- dinal optical mode as a function of frequency are based on size and concentration of the molecular and nanostructures of aluminum nitride ALN, boron nitride BN and AlxB7-XN7 as nanotubes has calculated using Ab –initio approximation method dependent on density functional theory and generalized gradient approximation. The geometrical structure are calculated by using Gauss view 05 as a complementary program. Shows the energy gap of ALN, BN and AlxB7-XN7 as a function of the total number of atoms , start from smallest molecule to reached
... Show MoreThe research aimed to study the job satisfaction of the staff of the Federal board of supreme Audit and its relation to the effectiveness of their performance, The questionnaire was adopted as a main tool in the collection of data and information from a random sample of (54) employees of the Federal board of supreme Audit. In light of this, the data were collected and analyzed and the hypotheses were tested using the statistical program (SPSS).
The researchers reached a number of conclusions, the most important of which were: (1) the respondents' response to the variables of job satisfaction and the effectiveness of the performance were medium; (2) there was a significant relationship between job satisfaction and performance effe
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThe purpose of this article is to introduce reverse engineering procedure (REP). It can achieved by developing an industrial mechanical product that had no design schemes throughout the 3D-Scanners. The aim of getting a geometric CAD model from 3D scanner is to present physical model. Generally, this used in specific applications, like commercial plan and manufacturing tasks. Having a digital data as stereolithography (STL) format. Converting the point cloud be can developed as a work in programming by producing triangles between focuses, a procedure known as triangulation. Then it could be easy to manufacture parts unknown documentation and transferred the information to CNC-machines. In this work, modification was proposed and used in RE
... Show More