The increased applications of technology in the field of architecture, especially digital technology and aspects of automation, have made a major impact on various aspects of local architecture, especially the traditional ones. As these technologies have succeeded in integrating many technological applications in many traditional and heritage buildings and taking them to more complex uses. And included in it characteristics that were not contained, therefore the research problem was concentrated in the absence of a holistic view of the role of the aspects of automation as a technological and design effect and its mutual effects on traditional buildings (especially the traditional Baghdadi houses), in terms of their foundations, indicators and use aspects, where the research aims to apply the characteristics of automation from Through the complementarity of its features, and an attempt to formulate new traditional local architectural text strategically rooted by the technology. This contributes to the advancement of the declining reality of selected models of Baghdadi houses and the attempt to elevate the architecture and use of them through the use of the effects of automation in them. Communication between the past, present and future towards creating a building with a new spirit.
This article investigates the relationship between foot angle and jump stability, focusing on minimizing injury risk. Here are the key points: Importance: Understanding foot angle is crucial for improving jump stability, athletic performance, and reducing jump-related injuries like ankle sprains. Ideal Foot Angle: Research suggests a forward foot angle of around 15 degrees might be ideal for many people during jumps. This angle distributes forces evenly across the foot, lowers the center of gravity, and provides more surface area for pushing off the ground. Factors Affecting Ideal Angle: The optimal angle can vary depending on the type of jump (vertical vs. long jump), fitness level, and personal preference. Incorrect Foot Angles: Landing w
... Show MoreHigh performance work systems and general industrial enterprise performance
Let be a commutative ring with 1 and be left unitary . In this paper we introduced and studied concept of semi-small compressible module (a is said to be semi-small compressible module if can be embedded in every nonzero semi-small submodule of . Equivalently, is semi-small compressible module if there exists a monomorphism , , is said to be semi-small retractable module if , for every non-zero semi-small sub module in . Equivalently, is semi-small retractable if there exists a homomorphism whenever . In this paper we introduce and study the concept of semi-small compressible and semi-small retractable s as a generalization of compressible and retractable respectively and give some of their adv
... Show MoreThe ground state proton, neutron and matter densities andcorresponding root mean square radii of unstable proton-rich 17Neand 27P exotic nuclei are studied via the framework of the twofrequencyshell model. The single particle harmonic oscillator wavefunctions are used in this model with two different oscillator sizeparameters core b and halo , b the former for the core (inner) orbitswhereas the latter for the halo (outer) orbits. Shell model calculationsfor core nucleons and for outer (halo) nucleons in exotic nuclei areperformed individually via the computer code OXBASH. Halostructure of 17Ne and 27P nuclei is confirmed. It is found that thestructure of 17Ne and 27P nuclei have 25 / 2 (1d ) and 1/ 2 2s -dominantconfigurations, resp
... Show MoreThe research is divided into three chapters, the first of them to the research problem and its importance and its purpose and its limits, while the second chapter review of contemporary sculpture as a vision and concept, The third chapter came to view the most important results reached by the search.
PC-based controller is an approach to control systems with Real-Time parameters by controlling selected manipulating variable to accomplish the objectives. Shell and tube heat exchanger have been identified as process models that are inherently nonlinear and hard to control due to unavailability of the exact models’ descriptions. PC and analogue input output card will be used as the controller that controls the heat exchanger hot stream to the desired temperature.
The control methodology by using four speed pump as manipulating variable to control the temperature of the hot stream to cool to the desired temperature.
In this work, the dynamics of cross flow shell and tube heat exchanger is modeled from step changes in cold water f
This paper presents two main parts: The first part involves manufacturing the specimens form composite material for mechanical testing (tensile, flexural and fatigue tests), then design a custom foot orthesis (CFO) and manufacturing from composite lamination (3nylglass 2carbon fiber 3nylglass) for patient suffer from flexible flat foot since birth and over-pronation. The second part of this research involves a design a model of custom foot orthesis in (solid work 2018) and then analysis of custom foot orthosis in engineering analysis program (ANSYS V.18.2).The applied pressure in boundary condition adopted from Force Sensor Resistance (FSR 402 ) in various regions in foot after wearing composite CFO. Used a composite materials in engineerin
... Show MoreThis paper presents the results of investigating the vibrational characteristics of oblate dish with and without framed structure . A finite element method, was applied to the dynamic analysis of oblate spheroidal shell. Different types of elements were considered in one dimension and two dimensions. It was found that the natural frequencies of oblate shells had two types of behavior against increasing the shell thickness and eccentricity, which are the membrane mode and bending mode –Since – the membrane modes natural frequencies tend to increase with the increasing the eccentricity of oblate, while the bending modes natural frequencies decrease with the increasing the eccentricity till reach the optimum eccentricity.
... Show More
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe problem motivation of this work deals with how to control the network overhead and reduce the network latency that may cause many unwanted loops resulting from using standard routing. This work proposes three different wireless routing protocols which they are originally using some advantages for famous wireless ad-hoc routing protocols such as dynamic source routing (DSR), optimized link state routing (OLSR), destination sequenced distance vector (DSDV) and zone routing protocol (ZRP). The first proposed routing protocol is presented an enhanced destination sequenced distance vector (E-DSDV) routing protocol, while the second proposed routing protocol is designed based on using the advantages of DSDV and ZRP and we named it as
... Show More