The study of the laptop computer table is one of the important studies at the present time due to the importance of electronic computers that are used in work sites and homes for very long hours, so one of the most important basics of caring for the comfort of the user lies in the design of the laptop table in different shapes and sizes and multiple functions in addition to calculating the measurements of the human body and the extent Its compatibility with the design and measurements of laptop computer tables by taking into account the calculations and measurements of the dimensions of the user's body of all ages and their consistency and use with the general measurements of the tables and the importance of research comes through the establishment of a knowledge base covering the topic of research to be of benefit to designers and specialists in this field and of benefit to product users as this study is It included all aspects of the tables, and the aim of this study was: to find foundations for building the formal system for the laptop table to be more suitable for the user. As for the limits of the research, the study of the formal system for the laptop table of the Chinese company Havic and available in the Iraqi market during the year 2011-2012 This study contains four chapters, the first chapter includes the research problem and the need for it in addition to oh The amount of research and its objectives and limits. As for the second chapter, it included the previous studies and the theoretical framework, which in turn contained three topics, the first was titled Foundations of Building the Formal System for the Laptop Desk and it contained an overview of the laptop computer, the laptop table, the system, the shape, and the second topic was titled Multifunctionality of the Laptop Table The third topic is on the mechanism of the human body ergonomics and its relationship to the laptop table. And then this chapter ended with indicators. The third chapter includes research procedures and methodology, and includes description and analysis of sample samples according to the axes analysis form. Finally, the fourth chapter included the results of the analysis, conclusions, recommendations and proposals. 1. The design system was distinguished by the efficiency of the functional performance and it helped in that the flat and supportive surface of the table surface in addition to the mechanism of the movement of the legs up and down as well as laterally and this achieved a distinct performance aspect although there were no fans for cooling The laptop computer while working and this was achieved in Form No. (1) and the percentage was 50%, while Model No. (2) achieved higher efficiency in functionality due to the presence of fans and the percentage was 50% .2 The dimensions of the computer tables differed according to the user’s need, as they were voluntary To the user as he wants through the size of the table tops and its inclination mechanism in addition to controlling the height and drop of the table legs. 3 The interconnectedness between the design parts aims to influence the functionality in a good way and this was achieved through the use of appropriate fastening means for the mechanism of movement and movement of the table by 50%
In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe aim of present study to investigate the effect of Coraindrum sativum leaves extract on reproductive activity of male albino mice .Thirty male mice with age of 80-100 day and weight between 25-30 g were divided into three groups: group 1 (untreated), group 2 and 3 were administrated orally for 30 days with aqueous extract of Coraindrum sativum leaves at dose 125 and 250mg/kg.b.w. respectively. The following parameters were evaluated: serum testosterone levels, testes weights, sperm characteristics [motility, viability, spermatozoa, morphology and concentration] and histology changes of the testis. The results showed that the treatment caused highly significant degrease (P<0.01) in testosterone levels and the weight of testes assoc
... Show MoreThe aim of present study to investigate the effect of Coraindrum sativum leaves extract on reproductive activity of male albino mice .Thirty male mice with age of 80-100 day and weight between 25-30 g were divided into three groups: group 1 (untreated), group 2 and 3 were administrated orally for 30 days with aqueous extract of Coraindrum sativum leaves at dose 125 and 250mg/kg.b.w. respectively.
The following parameters were evaluated: serum testosterone levels, testes weights, sperm characteristics [motility, viability, spermatozoa, morphology and concentration] and histology changes of the testis. The results showed that the treatment caused highly significant degrease (P<0.01) in testosterone levels and the weight of testes ass
Technologies of the theatre show elements get great transferring concerning the creative embodiment of its aesthetic elements including its raws, forms, parts and masses in an attempt to achieve the prin cipal expressive progress to embody the main theme of the idea and the intended subject .
This is within the criterion of supporting the way to deal with technologies (décor elements , lighting music tones vocal affects , fashion and makeup) that achieving the emagintional appropriate atmosbheres which the writer and the director of the theatre show aim to make it present and succeed by furming active participation tunches of the ability of the cinogra . phic – element dsigners in order to invlve the theatre space atmospheres in cl
The MTS-88. c trainer is a training system targeting students in the microprocessors course. It has a built in single-line assembler allowing the users to enter programs in assembly. It has the problem that long programs cannot be traced and tested efficiently. A simple error may cause all the code to be erased and the system to stop responding. Also, this system lacks the ability to be connected to the PC. The aim of this work is to modify the system to make it possible to be connected to the PC through the parallel port. This gives the capability to download long programs to the system after being developed in the PC. The 8255 Programmable Peripheral Interface available in the teaching system is interfaced to the parallel port and used as
... Show MoreThe research Was based to on a real problem and realistically of represented by that Iraqi Airways company does not have the electronic cost accounting system and therefore be the process of the pricing various services provided by a company sample research respecting air transport and air cargo and aviation fuel and services and catering are not properly especially in the presence of new data from the new companies entering competition in Iraqi aviation industry and therefore does not provide price flexibility in order to compete in getting market share, And then research this problem addressed through design an electronic cost Accounting system covers all the costs incurred by the compan
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show Moreإنّ التّأمّل في الدّراسات الأدبيّة النّقديّة الحديثة الّتي تنظر إلى النّصّ أنّه لوحة تتشكّل من مجموعة تداخلات نصّيّة سابقة للنصّ المُنتج أو مُعاصرة له، تدفع القارئ إلى الغوص في أعماق النّصوص وتحليلها والكشف عن الآليّات والإجراءات الّتي اعتمدت في إنتاجه، وإظهار الجماليّات الفنّيّة التي شكلت في مُجملها كائنا حيّا يُعبّر عن حالات إنسانيّة مُستمرة الحدوث رغم تقادم الأزمان.
فالبحث هذا يعمد
... Show More