Preferred Language
Articles
/
jcofarts-616
Intellectual Concepts of Skepticism in Industrial Product Design: مصعب حسن عبد-شيماء عبد الجبار
...Show More Authors

  The industrial design occupies an important status in public and private life activities, because it contains a group of interactive, productive, and interconnected institutions, which is confirmed by Descartes who is credited for promoting the method of skepticism on sound foundations, showing that in order for us to search for the truth, we must suspect everything that we confront let it be once in our life time, especially our options in the scientific research and industrial design and product, starting from the knowledge heritage and the intellectual concepts that ascend to the levels of the functional, aesthetic and environmental performance, the significance of skepticism becomes clear. The research problem lies in this question: Do the foundations of skepticism enable the industrial designer to reframe the design idea aesthetically and functionally? The research aims to find a relation between the concepts of the skepticism and the intellectual values of the industrial designer. That was the most prominent part in chapter one. As for the second chapter, it consists of two sections. The first is titled skepticism conceptually. The second section is concerned with the orientations of Cartesian skepticism and its reflections on the designer and the industrial product. The third chapter consists of the research procedures, that the content analysis method has been adopted in order to achieve the research objectives. The research community consists of the products (floating car, bracelet telephone, ring telephone) manufactured in Germany. The most important results have been reached at in chapter four including:
1- The relation between the Cartesian skepticism and the technical values indicates three-dimensional perceptions of floating products from the world of imagination, illusion and fantasy.
2- The problem of functional suitability is considered one of the fundamental considerations taken in designing the industrial product and according to the results, a number of conclusions have been reached at the most important of which are:
1- The products lacked the ability to compete with similar products in focusing on the aesthetic perspective, whereas the performative one, as a partial substitute in the product design structure.
2- Mathematical encryption algorithms are considered the most important systems for skepticism treatment in the design system.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Effect of Saline Water and Potassium Fertilizer on Nitrogen Fixation in Pisum sativum L.
...Show More Authors

Field experiment was conducted to test the effect of saline water 2 and7 dSm-1 potassium fertilizer rate 150,300 and 450 kg/donum on nitrogen fixation in Pisum sativum L. nodules. The experiment included anatomy study .Results water salinity ( 2,7 dSm-1) as a main plot and fertilizer rates as a sub plot. Results indicated that irrigation with saline water 7 dSm-¹ caused a significant decrease in N contents especially in the lower parts of the plants. The percentage of the N decreased in lower leaves to (0.01%) under 7dSm-¹ and 300 kg/donum fertilizer; however the percentage increased in the upper leaves to (2.80%) under with 2dSm-¹of irrigation water and 300 kg/ donum fertilizer rate. Fresh weight decreased to 6.26g under 7 dSm

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Astronomy & Astrophysics
The spatial extent of polycyclic aromatic hydrocarbons emission in the Herbig star HD 179218
...Show More Authors

Aim. We investigate, in the mid-infrared, the spatial properties of the polycyclic aromatic hydrocarbons (PAHs) emission in the disk of HD 179218, an intermediate-mass Herbig star at ~300 pc.

Methods. We obtained mid-infrared images in the PAH-1, PAH-2 and Si-6 filters centered at 8.6, 11.3, and 12.5 μm, and N-band low-resolution spectra using CanariCam on the 10-m Gran Telescopio Canarias (GTC). We compared the point spread function (PSF) profiles measured in the PAH filters to the profile derived in the Si-6 filter, where the thermal continuum emission dominates. We performed radiative transfer modeling of

... Show More
View Publication
Scopus (12)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Humidity effect on diffusion and length coefficient of radon in soil and building materials
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Thu Jun 23 2022
Journal Name
American Scientific Research Journal For Engineering, Technology, And Sciences
A Review of TCP Congestion Control Using Artificial Intelligence in 4G and 5G Networks
...Show More Authors

In recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne

... Show More
View Publication
Publication Date
Wed Nov 07 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Measuring of C-reactive protein titer in patients with acute hepatitis-C Virus infection
...Show More Authors

Objective(s): To measure serum C-reactive protein (CRP) titer as a predictive diagnosis of acute hepatitis C virus (HCV)
infection.
Methodology: Two hundred and ten patients with acute HCV infection and 234 apparently healthy individuals as
control group were enrolled in this study in Baghdad medical city (Teaching Laboratories). The patents include
74(35.2%) females and 136 (64.8%) males with mean age (27±16.5) years. The control group includes 114 (48.7%)
females and 120 (51.3%) males with mean age (26±5.8) years. Blood samples were collected from out patients from
Alfadul in Baghdad city. Sera were separated and stored at 20 0
C. The diagnosis of acute HCV infection was based on
detection of HC Ag and anti- H

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Wed May 01 2019
Journal Name
Astrophysics And Space Science
On the primordial specific frequency of globular clusters in dwarf and giant elliptical galaxies
...Show More Authors

View Publication
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Oct 29 2022
Journal Name
Current Trends In Geotechnical Engineering And Construction
Automatic Co-registration of UAV-Based Photogrammetry and Terrestrial Laser Scanning in Urban Areas
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Drug Design, Development And Therapy
Prophylactic effects of Clausena excavata Burum. f. leaf extract in ethanol-induced gastric ulcers
...Show More Authors

View Publication
Scopus (45)
Crossref (18)
Scopus Clarivate Crossref