Preferred Language
Articles
/
jcofarts-704
Building the foundations of a formal system of the laptop table: حنان غازي صالح
...Show More Authors

The study of the laptop computer table is one of the important studies at the present time due to the importance of electronic computers that are used in work sites and homes for very long hours, so one of the most important basics of caring for the comfort of the user lies in the design of the laptop table in different shapes and sizes and multiple functions in addition to calculating the measurements of the human body and the extent Its compatibility with the design and measurements of laptop computer tables by taking into account the calculations and measurements of the dimensions of the user's body of all ages and their consistency and use with the general measurements of the tables and the importance of research comes through the establishment of a knowledge base covering the topic of research to be of benefit to designers and specialists in this field and of benefit to product users as this study is It included all aspects of the tables, and the aim of this study was: to find foundations for building the formal system for the laptop table to be more suitable for the user. As for the limits of the research, the study of the formal system for the laptop table of the Chinese company Havic and available in the Iraqi market during the year 2011-2012 This study contains four chapters, the first chapter includes the research problem and the need for it in addition to oh The amount of research and its objectives and limits. As for the second chapter, it included the previous studies and the theoretical framework, which in turn contained three topics, the first was titled Foundations of Building the Formal System for the Laptop Desk and it contained an overview of the laptop computer, the laptop table, the system, the shape, and the second topic was titled Multifunctionality of the Laptop Table The third topic is on the mechanism of the human body ergonomics and its relationship to the laptop table. And then this chapter ended with indicators. The third chapter includes research procedures and methodology, and includes description and analysis of sample samples according to the axes analysis form. Finally, the fourth chapter included the results of the analysis, conclusions, recommendations and proposals. 1. The design system was distinguished by the efficiency of the functional performance and it helped in that the flat and supportive surface of the table surface in addition to the mechanism of the movement of the legs up and down as well as laterally and this achieved a distinct performance aspect although there were no fans for cooling The laptop computer while working and this was achieved in Form No. (1) and the percentage was 50%, while Model No. (2) achieved higher efficiency in functionality due to the presence of fans and the percentage was 50% .2 The dimensions of the computer tables differed according to the user’s need, as they were voluntary To the user as he wants through the size of the table tops and its inclination mechanism in addition to controlling the height and drop of the table legs. 3 The interconnectedness between the design parts aims to influence the functionality in a good way and this was achieved through the use of appropriate fastening means for the mechanism of movement and movement of the table by 50%

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences
Dewatering System Control by MATLAB Software
...Show More Authors

The aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Fri Nov 26 2010
Journal Name
Wireless Personal Communications
Security Problems in an RFID System
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Adaptive Coded Modulation for OFDM System
...Show More Authors

This paper studies the adaptive coded modulation for coded OFDM system using punctured convolutional code, channel estimation, equalization and SNR estimation. The channel estimation based on block type pilot arrangement is performed by sending pilots at every sub carrier and using this estimation for a specific number of following symbols. Signal to noise ratio is estimated at receiver and then transmitted to the transmitter through feedback channel ,the transmitter according to the estimated SNR select appropriate modulation scheme and coding rate which maintain constant bit error rate
lower than the requested BER. Simulation results show that better performance is confirmed for target bit error rate (BER) of (10-3) as compared to c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Traveling Wave Cylindrical Induction Heating System
...Show More Authors

The paper deals with the traveling wave cylindrical heating systems. The analysis presented is analytical and a multi-layer model using cylindrical geometry is used to obtain the theoretical results. To validate the theoretical results, a practical model is constructed, tested and the results are compared with the theoretical ones. Comparison showed that the adopted analytical method is efficient in describing the performance of such induction heating systems.

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 10 2010
Journal Name
Iraqi Journal Of Laser
Disc Laser System Construction and Characterization
...Show More Authors

 In this work a Nd:YVO4 thin disc laser setup is designed and fabricated. The disk laser system
is designed to be compact. The laser crystal was pumped by a 808 nm diode laser. The effect of input
current and pulse frequency on the output energy at pulse operation mode, and the effect of the input
current on the output power at CW mode operation are tested. At the pulsed mode, the output energy
increased linearly with the input current and decreased with pulse frequency. The threshold current
increased with increasing pulse frequency increasing. The maximum output energy from the thin disc
laser was 0.98 μJ at 1.3 kHz frequency, with 0.49A. A minimum threshold current for CW mode of
operation. The maximum outpu

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 01 2022
Journal Name
Computers And Electrical Engineering
Automatic illness prediction system through speech
...Show More Authors

View Publication
Scopus (10)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees21gr
Challenges facing the transition of traditional cities to smart: Studying the challenges faced by the transition of a traditional area such as Al-Kadhimiya city center to the smart style
...Show More Authors

Challenges facing the transition of traditional cities to smart: Studying the challenges faced by the transition of a traditional area such as Al-Kadhimiya city center to the smart style

View Publication
Scopus (5)
Scopus Crossref
Publication Date
Fri Dec 31 2010
Journal Name
Journal Of Legal Sciences
The moment of concluding the contract according to the United Nations Convention on Contracts for the International Sale of Goods (1980) (A comparative study with some Arab and foreign legislations)
...Show More Authors

There are two ways that the contract might be formed with (contracting between persons who are attended and contracting between absence persons).the need for determining the precise moment of the contract , is so clear because there is a specify period separate between the declaration of acceptance and the knowledge with it .and it is clear from the four theories known for jurisprudence (theory of the declaration of the acceptance, theory of exporting the acceptance , theory of the arrival of the acceptance , theory of the knowledge with the acceptance ) . It is difficult to promote one theory on another one if we look at each one and the justification of its supporters and what the opponents of each theory expose. Legal background and diff

... Show More
View Publication