The theatre costume with the rest of the theatre show elements constitute a system of the meaning relations that produce a visual image that helps the recipient to decipher the theatre scene, let alone the manifestation of time in its levels (past, present, future) through the design construction of the theatre elements among which is the theatre costume. In order to know the way of manifesting time through the formulation of the theatre costumes, the research question has been put as follows: how to manifest time through the design construction for the theatre costumes unit, from which the research objective is derived as follows: Revealing the possibility of the designing unit of the costumes in manifesting the levels of time wit
... Show MoreThis paper discusses using H2 and H∞ robust control approaches for designing control systems. These approaches are applied to elementary control system designs, and their respective implementation and pros and cons are introduced. The H∞ control synthesis mainly enforces closed-loop stability, covering some physical constraints and limitations. While noise rejection and disturbance attenuation are more naturally expressed in performance optimization, which can represent the H2 control synthesis problem. The paper also applies these two methodologies to multi-plant systems to study the stability and performance of the designed controllers. Simulation results show that the H2 controller tracks a desirable cl
... Show MoreA bolted–welded hybrid demountable shear connector for use in deconstructable steel–concrete composite buildings and bridges was proposed. The hybrid connector consisted of a partially threaded stud, which was welded on the flange of a steel section, and a machined steel tube with compatible geometry, which was bolted on the stud. Four standard pushout tests according to Eurocode 4 were carried out to assess the shear performance of the hybrid connector. The experimental results show that the initial stiffness, shear resistance, and slip capacity of the proposed connector were higher than those of traditional welded studs. The hybrid connector was a ductile connector, according to Eurocode 4, with slip capacity higher than 6 mm. A nonli
... Show MoreThe game of volleyball, like all other sports, has been made by new amendments, the most important of which is the system of what is not the system of the free player in 1998, which gave added importance to the skills of receiving the transmission and defending the stadium being one of the important skills where the law allowed the free player to move and position in the back positions of the stadium Limited support mainly defensive skills. This is to make the state of stability and balance between defensive and offensive skills, which helps in the development of the game and make it exciting and enjoyable for players and fans. Therefore, the researchers decided to shed light by identifying the percentage of the contribution of the free pla
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show More