Theatrical techniques took upon themselves the responsibility of building and organizing the theatrical form for the various forms of performances, and it was the important tool that the show makers could rely on in carrying out the various works at the audio-visual level, and lighting is one of the most important elements of the visual formation of the image in the show, as it is related to the visual process and what it can achieve in operations The contrast that constitutes the aesthetic and intellectual values of the theatrical show, especially since the process of adjusting the element of time and the timings for receiving or delivering, moving, and the movement of the actor is what can determine the rhythm of the scene, which in it
... Show MoreThe main challenge of military tactical communication systems is the accessibility of relevant information on the particular operating environment required for the determination of the waveform's ideal use. The existing propagation model focuses mainly on broadcasting and commercial wireless communication with a highs transceiver antenna that is not suitable for numerous military tactical communication systems. This paper presents a study of the path loss model related to radio propagation profile within the suburban in Kuala Lumpur. The experimental path loss modeling for VHF propagation was collected from various suburban settings for the 30-88 MHz frequency range. This experiment was highly affected by ecological factors and existing
... Show MoreThis paper presents a new approach to discover the effect of depth water for underwater visible light communications (UVLC). The quality of the optical link was investigated with varying water depth under coastal water types. The performance of the UVLC with multiple input–multiple output (MIMO) techniques was examined in terms of bit error rate (BER) and data rate. The theoretical result explains that there is a good performance for UVLC system under coastal water.
This paper is concerned with introducing and studying the o-space by using out degree system (resp. i-space by using in degree system) which are the core concept in this paper. In addition, the m-lower approximations, the m-upper approximations and ospace and i-space. Furthermore, we introduce near supraopen (near supraclosed) d. g.'s. Finally, the supra-lower approximation, supraupper approximation, supra-accuracy are defined and some of its properties are investigated.
The research Was based to on a real problem and realistically of represented by that Iraqi Airways company does not have the electronic cost accounting system and therefore be the process of the pricing various services provided by a company sample research respecting air transport and air cargo and aviation fuel and services and catering are not properly especially in the presence of new data from the new companies entering competition in Iraqi aviation industry and therefore does not provide price flexibility in order to compete in getting market share, And then research this problem addressed through design an electronic cost Accounting system covers all the costs incurred by the compan
... Show MoreObjectives: Evaluation of school health surveillance system with Indicate the level of usefulness of this system,
in addition to Describe the system.
Methodology: A probability multistage sample of (54) subjects which is selected the school health units from
the health institutions. Questionnaire has been divided into three main parts consist, form(A) especially for
health directorate, form (B) for health sectors, and form (C) for primary health care centers; each form contains
the basic components, structure, process, outcome, total items of questionnaire was ( 74) items.
Results: The study results indicate that the system is average adequacy, simple, moderately flexible, highly
acceptance, representative, low utili
With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreThis research is an initial attempt to explore the reality of education and its concept in Islam, and to describe the presence of educational practices in the Arab-Islamic heritage. The importance of this research lies in addressing a set of important issues related to the contemporary Islamic educational system. The research revealed the extent of the need for authentic educational values that draw their reference from the origins of Islam, and it emphasized the analysis of the reality of education in the Islamic world and the identification of its problems and the finding of solutions through a quick and comprehensive look at the diverse contributions of Muslimthinkers to Islamic educational thought, and their active ro
... Show MoreAbstract
One of the major components in an automobile engine is the throttle valve part. It is used to keep up with emissions and fuel efficiency low. Design a control system to the throttle valve is newly common requirement trend in automotive technology. The non-smoothness nonlinearity in throttle valve model are due to the friction model and the nonlinear spring, the uncertainty in system parameters and non-satisfying the matching condition are the main obstacles when designing a throttle plate controller.
In this work, the theory of the Integral Sliding Mode Control (ISMC) is utilized to design a robust controller for the Electronic Throttle Valve (ETV) system. From the first in
... Show More