Preferred Language
Articles
/
joe-1183
Algorithmic Synergy and Architectural Form Generation Mechanisms
...Show More Authors

Today, the architecture field is witnessing a noticeable evolution regarding the used tools that the designer should invest in a peculiar way that is made available in architecture through the concept of synergy generally and algorithmic synergy specifically. The synergy is meant to study and analyze the cooperative behavior of complex systems and self-organizing systems that leads to different outputs referred to by the synergy as the (whole), which is bigger than the sum of parts and in architecture, it's translated as the architectural form. This point resulted in a need of a specific study regarding the concept of synergy that focuses on the cooperative, synergistic relations within the trilogy of (form, structure, and material) and clarifies the role of technological evolution of design tools through algorithmic synergy in formulating that relation, thus resulted in the research's problem which came in the following statement (The lack of clear knowledge of the algorithmic synergy and its mechanisms in generating and discovering the architectural form digitally) and to solve this problem and Achieving the research goal which is represented in (Clarifying the knowledge regarding the role of algorithmic synergy and its mechanisms in generating and discovering the architectural form digitally), the research clarifies the concept of "Synergy" in general and "Algorithmic Synergy" precisely in order to get the epitome of vocabulary on the theoretical part and moving on to the practical application on elected projects samples  moving on to the conclusions and recommendations that shows having the architecture a self-organizing synergy system connects the designer and the developed digital tool that is provided by algorithmic synergy, plays a vital role in reaching the digitally synergized whole that represented by the architectural form.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 11 2019
Journal Name
Iraqi Journal Of Physics
Proton momentum distributions and elastic electron scattering form factors for some Ge isotopes
...Show More Authors

The proton momentum distributions (PMD) and the elastic
electron scattering form factors F(q) of the ground state for some
even mass nuclei in the 2p-1f shell for 70Ge, 72Ge, 74Ge and 76Ge are
calculated by using the Coherent Density Fluctuation Model (CDFM)
and expressed in terms of the fluctuation function (weight function)
|F(x)|2. The fluctuation function has been related to the charge
density distribution (CDD) of the nuclei and determined from the
theory and experiment. The property of the long-tail behavior at high
momentum region of the proton momentum distribution has been
obtained by both the theoretical and experimental fluctuation
functions. The calculated form factors F (q) of all nuclei under s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 12 2017
Journal Name
Al-academy
Polarization and the mechanism of communication in the form of industrial products (green)
...Show More Authors

Our research which is under the name "Polarization and Communication mechanism in the formation of green industrial products " The problem of the research focuses in identifying what is polarization and its function mechanisms , by displaying the inventive and creative cases of the designer in how to exploit the industrial products and its recycling process to attract the user and recipient by asserting on the values of beauty of the appearance of the industrial product with the attraction Of the user and the recipient with the new function of that product and how its different from the function achieved by the old product , with consideration of nature and its preservation . The results of the research were as following : The designer e

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 31 2017
Journal Name
Pramana
Matter density distributions and elastic form factors of some two-neutron halo nuclei
...Show More Authors

The Skyrme–Hartree–Fock (SHF) method with MSK7 Skyrme parameter has been used to investigate the ground-state properties for two-neutron halo nuclei 6He, 11Li, 12Be and 14Be. These ground-state properties include the proton, neutron and matter density distributions, the corresponding rms radii, the binding energy per nucleon and the charge form factors. These calculations clearly reveal the long tail characterizing the halo nuclei as a distinctive feature.

View Publication
Scopus (15)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sun Dec 22 2019
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Formulation and Characterization of Itraconazole as Nanosuspension Dosage Form for Enhancement of Solubility
...Show More Authors

Abstract

            Itraconazole is a triazole antifungal given orally for the treatment of oropharyngeal and vulvovaginal candidiasis, for systemic infections including aspergillosis, candidiasis,  and for the prophylaxis of fungal infections in immunocompromised patients.

           The study aimed to formulate a practical water-insoluble Itraconazole, with insufficient bioavailability as nanosuspension to increase aqueous solubility and improve its dissolution and oral bioavailability.

          Itraconazole nanosuspension was produced by a

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (10)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Dec 30 2011
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Energy Generation from Static Water Head Developed By Forward Osmosis
...Show More Authors

In this work, the possibility of utilizing osmosis phenomenon to produce energy as a type of the renewable energy using Thin Film Composite Ultra Low Pressure membrane TFC-ULP was studied. Where by forward osmosis water passes through the membrane toward the concentrated brine solution, this will lead to raise the head of the high brine solution. This developed static head may be used to produce energy. The aim of the present work is to study the static head developed and the flux on the high brine water solution side when using forward and reverse osmosis membranes for an initial concentration range from 35-300 g/l for each type of membrane used at room temperature and pressure conditions, and finally calculating the maximum possible po

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2010
Journal Name
International Journal Of Advanced Intelligence Paradigms
Assessing IRPS as an efficient pairwise test data generation strategy
...Show More Authors

View Publication
Scopus (10)
Crossref (9)
Scopus Crossref
Publication Date
Sat Mar 01 2014
Journal Name
International Journal Of Computer Science Engineering And Technology
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si

... Show More
Publication Date
Tue Jan 01 2008
Journal Name
Lecture Notes In Computer Science
IRPS – An Efficient Test Data Generation Strategy for Pairwise Testing
...Show More Authors

View Publication
Scopus (21)
Crossref (7)
Scopus Crossref
Publication Date
Wed Oct 01 2008
Journal Name
2008 First International Conference On Distributed Framework And Applications
A strategy for Grid based t-way test data generation
...Show More Authors

View Publication
Scopus (22)
Crossref (17)
Scopus Crossref