out of the familiar context in interior design and surprise the user with a new design event that is emotionally caressing psychologically and physically alluring which is not an easy matter in a time where knowledge is within everyone's reach, and the reasons for achieving the design event became a creative evaluation by the user, not only at the formative level, but also at the space level as a design event that is dealt with by a causal and not inevitable manner, Achieving the event of surprise in designing interior spaces has proved to be a great challenge to the interior designer's abilities to think of out of the ordinary and bypassing the user's cognitive reference as an experience to achieve the emotions of surprise, suspense, attraction, interaction and enjoyment with its positive progression away from emotional confusion in dealing with the event, so we conducted an extensive study that addressed the research problem, its importance and purpose, while indicating its limits. In order to avoid confusion, most key terms mentioned, were defined, and the theoretical framework included two topics: the first of which dealt with the design event and its causal process, while the second dealt with the surprise event in interior design, its causes and consequences. Ultimately, a set of conclusions were drawn that summarized the scientific and objective process of research starting with the problem down to its goal: The surprise occurrence in the interior design, the partial becoming occurring at the level of the whole, and the overall process occurring at the level of the part. Numerous recommendations were also made.
In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show MoreThe simulation is the oldest theory in art, since it appeared in the Greek aesthetic thought of the philosopher Plato, as we find in many of the thinkers and philosophers over a wide period of time to reach our world today. Our fascination with art in general and design art in particular is due to the creativity and innovations of the artist through the simulation, as well as the peculiarities in this simulation, which give objects signs and signals that may have an echo that sometimes does not exist in their physical reality.
The real representation of life and design construction, descriptions of the expression of each of them in the form of intellectual construction and the ideas of producti
... Show MoreThe Iraqi outfit is characterized by special features and identity that are closely related to the traditions, customs, religious and social beliefs and other references of the Iraqi environment and its factors affecting the individual and society. Every place in Iraq has its own uniform, which differs in terms of its artistic, aesthetic and functional components from place to place.
The abaya, especially worn by women, is especially distinct in terms of the design of the uniform, the nature of the cloth made of it, as well as the color of the abaya, which is dominated by black in most designs. The Dar Al-Taros Center and Textile Research initiated the construction of theoretical and practical bases in the design of contemporary
... Show MoreConstructal theory plays a major role in the conceptual design stage of the structural system in architecture. It provides a conceptual framework for predicting the form depending on natural systems to model those systems geometrically according to the constructal law that works in two directions: the first is towards predicting the general form of the structural system, and the second is the physical application of the law in the process of detailed design of the parts of the system. The aim of this paper is to determine the mechanism adopted in the structural design according to the constructal theory, assuming that the structural design according to the constructal theory achieves
The research deals with solar energy as one of the sources of renewable energies available in Iraq, which can be utilized. The research aims to identify the design pillars of the use of solar energy in street furniture and its relationship to formal variables. The research limits included street furniture manufactured by JCDecaux in Boston during the period 2015-2016, and included the theoretical framework which consists of two sections: solar energy (its beginnings and uses), and solar energy and its uses in Street furniture design.
As far as the research procedures and methodology are concerned, it adopted the descriptive approach in describing and analyzing the sample models in addition to describing and analyzing the sample i
... Show MoreIn this paper, a step-index fiber with core index 1.445 5 1 7 and cladding index 1.443 1 5 7 has been designed and studied. Multimode operation is achieved by using a fiber with core radius 25 μm operating at a wavelength of 1.3 μm. The mode parameters (effective refractive index, phase constant, fractional modal power in the core and cutoff wavelength) were calculated using RP fiber calculator (PRO version 2020). The shapes of the intensity and amplitude distribution of linearly polarized guided modes were shown.
Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the
... Show MoreThis work is focused on the design parameters and activity of artificial human finger for seven grips. At first, obtained the ideal kinematics of human fingers motion by analyzing the grips video which were recorded using a single digital camera recorder fitted on a tripod in sagital plane while the hand is moving. Special motion analysis software (Dartfish) the finger joint angles were studied using the video recording. Then the seven grips were modeled using static torque analysis, which calculates the amount of torque applied on the fingers joint grip depending on the results of the kinematic analysis. The last step of the work was to design the actuator (Muscle Wire) of artificial finger for the seven grips in a simple design approac
... Show MoreIn developing countries, individual students and researchers are not able to afford the high price of the subscription to the international publishers, like JSTOR, ELSEVIER,…; therefore the governments and/or universities of those countries aim to purchase one global subscription to the international publishers to provide their educational resources at a cheaper price, or even freely, to all students and researchers of those institutions. For realizing this concept, we must build a system that sits between the publishers and the users (students or researchers) and act as a gatekeeper and a director of information: this system must register its users and must have an adequate security to e
... Show MoreVariable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio