Preferred Language
Articles
/
jcofarts-704
Building the foundations of a formal system of the laptop table: حنان غازي صالح
...Show More Authors

The study of the laptop computer table is one of the important studies at the present time due to the importance of electronic computers that are used in work sites and homes for very long hours, so one of the most important basics of caring for the comfort of the user lies in the design of the laptop table in different shapes and sizes and multiple functions in addition to calculating the measurements of the human body and the extent Its compatibility with the design and measurements of laptop computer tables by taking into account the calculations and measurements of the dimensions of the user's body of all ages and their consistency and use with the general measurements of the tables and the importance of research comes through the establishment of a knowledge base covering the topic of research to be of benefit to designers and specialists in this field and of benefit to product users as this study is It included all aspects of the tables, and the aim of this study was: to find foundations for building the formal system for the laptop table to be more suitable for the user. As for the limits of the research, the study of the formal system for the laptop table of the Chinese company Havic and available in the Iraqi market during the year 2011-2012 This study contains four chapters, the first chapter includes the research problem and the need for it in addition to oh The amount of research and its objectives and limits. As for the second chapter, it included the previous studies and the theoretical framework, which in turn contained three topics, the first was titled Foundations of Building the Formal System for the Laptop Desk and it contained an overview of the laptop computer, the laptop table, the system, the shape, and the second topic was titled Multifunctionality of the Laptop Table The third topic is on the mechanism of the human body ergonomics and its relationship to the laptop table. And then this chapter ended with indicators. The third chapter includes research procedures and methodology, and includes description and analysis of sample samples according to the axes analysis form. Finally, the fourth chapter included the results of the analysis, conclusions, recommendations and proposals. 1. The design system was distinguished by the efficiency of the functional performance and it helped in that the flat and supportive surface of the table surface in addition to the mechanism of the movement of the legs up and down as well as laterally and this achieved a distinct performance aspect although there were no fans for cooling The laptop computer while working and this was achieved in Form No. (1) and the percentage was 50%, while Model No. (2) achieved higher efficiency in functionality due to the presence of fans and the percentage was 50% .2 The dimensions of the computer tables differed according to the user’s need, as they were voluntary To the user as he wants through the size of the table tops and its inclination mechanism in addition to controlling the height and drop of the table legs. 3 The interconnectedness between the design parts aims to influence the functionality in a good way and this was achieved through the use of appropriate fastening means for the mechanism of movement and movement of the table by 50%

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Assessment of Observed Building Structure Setback of Shops along an Arterial Road and Noise Intrusion Level
...Show More Authors

Roads irrespective of the type have specific standard horizontal distance measured at 90 degrees from a lot boundary to a development known as a setback. Non-observance of the recommended setbacks accommodated in any urban center’s master plan creates noise hazard to the public health and safety as the movement of vehicular traffic is not without the attendant noise. This study assessed noise intrusion level in shops along a section of Ibadan-Abeokuta road with due consideration to compliance with the recommended building structure setback. Analysis of noise descriptors evaluated in this study gave A-weighted equivalent sound pressure level average of 91.3 dBA, the daytime average sound level (LD) 92.27 dBA,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of The College Of Education For Women
The Aesthetic of the Textual Interferences in the Poetry of the Ghawani's" A Miracle Nice of your Imagination as a symbol"
...Show More Authors

     إنّ التّأمّل في الدّراسات الأدبيّة النّقديّة الحديثة الّتي تنظر إلى النّصّ أنّه لوحة تتشكّل من مجموعة تداخلات نصّيّة سابقة للنصّ المُنتج أو مُعاصرة له، تدفع القارئ إلى الغوص في أعماق النّصوص وتحليلها والكشف عن الآليّات والإجراءات الّتي اعتمدت في إنتاجه، وإظهار الجماليّات الفنّيّة التي شكلت في مُجملها كائنا حيّا يُعبّر عن حالات إنسانيّة مُستمرة الحدوث رغم تقادم الأزمان.

فالبحث هذا يعمد

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 19 2023
Journal Name
المجلة العراقية للعلوم السياسية
دور الفواعل من غير الدول في النظام العالمي
...Show More Authors

ينطبق مصطلح الفاعلين من غير الدول على جميع القوى أو المنظمات أو الجهات التي لا تؤسسها الدولة ولا تكون طرفاً فيها، ولها هويتها الخاصة، وتتمتع بإستقلال تام عن تمويل ومراقبة الحكومات، وتمتلك مواردها الخاصة التي تضمن لها تحقيق أهدافها في البيئة التي تنشط فيها. إن الفواعل من غير الدول بوصفها كيانات إجتماعية أو إقتصادية غير حكومية ، قد جاءت نتيجة التحول الحاصل في بنية النظام الدولي والسياسة الدولية بإتجاه النظام

... Show More
Publication Date
Wed Dec 19 2018
Journal Name
Journal Of Planner And Development
دور الفضاء الحضري في استدامة النظام البيئي والاجتماعي
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Design an Integral Sliding Mode Controller for a Nonlinear System
...Show More Authors

The goal of this paper is to design a robust controller for controlling a pendulum
system. The control of nonlinear systems is a common problem that is facing the researchers in control systems design. The Sliding Mode Controller (SMC) is the best solution for controlling a nonlinear system. The classical SMC consists from two phases. The first phase is the reaching phase and the second is the sliding phase. The SMC suffers from the chattering phenomenon which is considered as a severe problem and undesirable property. It is a zigzag motion along the switching surface. In this paper, the chattering is reduced by using a saturation function instead of sign function. In spite of SMC is a good method for controlling a nonlinear system b

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Drug Delivery Technology
Transethosomes a novel transdermal drug delivery system for antifungal drugs
...Show More Authors

Scopus (9)
Scopus
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref