Preferred Language
Articles
/
jcofarts-664
The system and Disorder of shape and content in Interior Design Educational halls in the Ministry of Labor and Social Affairs (Analytical study): رجاء سعدي لفتة
...Show More Authors

Dealing with this study to find a link principle in the construction of the system and disorder to the promise of the principles and concepts of intellectual and philosophical form and content in the act of interior design of the halls education in the Ministry of Labor and Social Affairs , which leads to a reaction design objective and functionally and to increase the strength of the effect on users of the coaches and trainers . As it informs the side cognitive and developmental study of the design of the interior spaces . So it was the goal of research in the detection of the nature of the system and disorder with Focus indicators and the type of regulations and privacy and what constitutes the framework of knowledge in order to explain it through the procedures of this search for halls education in the Ministry of Labor and Social Affairs, with regard to the shape and content in these halls , as well as the importance of research and identify terminology .The second chapter includes theoretical framework , which included two sections the first section focuses on the concept of the system and disorder , and the second section focused on the expressive implications of form and content . Indicators were extract relied upon analysis of axles form . The third chapter was devoted to research procedures where followed a researcher descriptive approach and from the case study (Case - Study) through the analysis of three spaces belonging to the department of vocational training at the Ministry of Labor and Social Affairs , namely: ( a hall for English language teaching and workshop for air conditioning and refrigeration workshop art of cutting and sewing ) . Among the most prominent findings by the researcher are: Deficiencies in the recruitment of the foundations of interior design in these spaces led to the loss of tensile property and visual attraction , which is reflected in the decline in the proportion of common sense of the formal organization of the space , which led to disorder in the functional and aesthetic side of those spaces .As one of the most important conclusions reached by the researcher is that the organization , coordination and arrangement, is basically a requirement to coordinate the flow of movement that have impact on the success of the functionSpace.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use the path analysis method to diagnoseFactors influencing the intentions of the employees of the University of Dhi Qar To introduce Internet behavior
...Show More Authors

The purpose of this study is to diagnose factors that effect Thi-Qar behavioral intention to use internet. A sample of (127) internet users of university staff was taken in the study and were analyzed by using path analyze . The study concluded that there is a set of affecting correlation. It was founded that exogenous variables (gender, income, perceived fun, perceived usefulness, Image, and ease of use) has significant effect on endogenous (behavioral intention) . The result of analysis indicated that image hopeful gained users comes first, ease of use secondly, perceived fan and perceived usefulness on (dependent variables (daily internet usage and diversity of internet usage. Implication of these result are discussed . the st

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EFFECT OF Artemisia vulgaris L. AQUEOUS EXTRACT ON SOME GERMINATION PROPERTIES AND SEEDLING GROWTH OF LINSEED : EFFECT OF Artemisia vulgaris L. AQUEOUS EXTRACT ON SOME GERMINATION PROPERTIES AND SEEDLING GROWTH OF LINSEED
...Show More Authors

ABSTRACT

            A laboratory experiment was carried out during winter season of 2021 in the Seed Technology Laboratory- College of Agricultural Engineering Sciences/ University of Baghdad, to find out the allopathic effects of aerobic and terrestrial aqueous extracts of Artemisia vulgaris L. on the seed germination and seedling growth of linseed. A factorial experiment according to a completely randomized design (CRD)at three replicates was used; the first factor in clouded type of aqueous extract for two plant parts which were aerobic (stems and leaves) and terrestrial (root and rhizomes), while the second factor included five concentrations

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Computers And Electrical Engineering
Automatic illness prediction system through speech
...Show More Authors

View Publication
Scopus (12)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences
Dewatering System Control by MATLAB Software
...Show More Authors

The aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.

View Publication Preview PDF
Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Traveling Wave Cylindrical Induction Heating System
...Show More Authors

The paper deals with the traveling wave cylindrical heating systems. The analysis presented is analytical and a multi-layer model using cylindrical geometry is used to obtain the theoretical results. To validate the theoretical results, a practical model is constructed, tested and the results are compared with the theoretical ones. Comparison showed that the adopted analytical method is efficient in describing the performance of such induction heating systems.

View Publication Preview PDF
Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Adaptive Coded Modulation for OFDM System
...Show More Authors

This paper studies the adaptive coded modulation for coded OFDM system using punctured convolutional code, channel estimation, equalization and SNR estimation. The channel estimation based on block type pilot arrangement is performed by sending pilots at every sub carrier and using this estimation for a specific number of following symbols. Signal to noise ratio is estimated at receiver and then transmitted to the transmitter through feedback channel ,the transmitter according to the estimated SNR select appropriate modulation scheme and coding rate which maintain constant bit error rate
lower than the requested BER. Simulation results show that better performance is confirmed for target bit error rate (BER) of (10-3) as compared to c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
AXIAL FAN BEARING SYSTEM VIBRATION ANALYSIS
...Show More Authors

Rotating fan shaft system was investigated experimentally and theoretically to study its dynamic performance. The type of oil used for the bearing was taken in consideration during the experimental program .Three types of oil were used, SAE 40, SAE 50 and degraded oil. During the experiments, the fan blades stagger angle was changed through angles (20˚, 30˚, 40˚, and 50˚). The shaft rotational speed also changed in the range of (0-3000 rpm). All these parameters have investigated for two cases (balanced and unbalanced fan). The performance parameters of the fan were found experimentally by measuring the fan, volume flow rate, Reynolds and Strouhal numbers, efficiency and pressure head. Analytical part was also represented to prepare

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.