Over the last few years, the interior designer has been given the ability to access many innovative tools for new forms of unprecedented diversity and efficiency. Some design experts have described the new parametric procedures they are introducing to create new interior projects as a radical transformation that carries all the elements of a qualitative shift in interior design. The best of these parametric procedures is the technical capabilities offered by us to create new forms that are different from what has been discussed in everything that has been produced by designers and architects since modernity and even before it to the present time, which returns our design products through a series of computer programs that perform the processes that Simulates selective ecology of nature. However, it is wrong to believe that these parametric programs can be unconditionally loaded with a manager who controls their inputs and outputs. The designer is allowed to release them properly, let alone optimize them, and solve complex design issues without interference from the interior designer. Critical stages of the design process. Failures to intervene, adapt, or simply understand the algorithms given characteristics of the innovative form. Is entirely responsible for an unfortunate series of interior optimization and computerized systems analysis produced by the field of design so far. One thing that is clear to us is the definite convergence that takes place between interior design and other engineering disciplines, facilitated on the basis of data exchange through parametric modeling programs. The purpose of this research is to find creative approaches that celebrate the symbiotic and inevitable relationship in our present day between the interior designer and the computer. Founded by research and experimentation of a new dynamic method called parametricism characterized by its aesthetic effects in the interior design in the third millennium than previous movements and techniques producing the new form is certainly unprecedented.
Electrocoagulation is an electrochemical process of treating polluted water where sacrificial anode corrodes to produce active coagulant (usually aluminum or iron cations) into solution. Accompanying electrolytic reactions evolve gas (usually as hydrogen bubbles). The present study investigates the removal of phenol from water by this method. A glass tank with 1 liter volume and two electrodes were used to perform the experiments. The electrode connected to a D.C. power supply. The effect of various factors on the removal of phenol (initial phenol concentration, electrode size, electrodes gab, current density, pH and treatment time) were studied. The results indicated that the removal efficiency decreased as initial phenol concentration
... Show MoreResearch was: 1- known as self-efficacy when students perceived the university. 2- know the significance of statistical differences in perceived self-efficacy according to gender and specialty. Formed the research sample of (300) students were chosen from the original research community by way of random (150) male specialization and scientific and humanitarian (150) females specialized scientific and humanitarian. The search tool to prepare the yard tool to measure perceived self-efficacy based on measurements and previous literature on the subject of perceived self-efficacy. The researcher using a number of means, statistical, including test Altaúa and analysis of variance of bilateral and results showed the enjoyment of the research s
... Show MoreThe use of deep learning.
Autonomous motion planning is important area of robotics research. This type of planning relieves human operator from tedious job of motion planning. This reduces the possibility of human error and increase efficiency of whole process.
This research presents a new algorithm to plan path for autonomous mobile robot based on image processing techniques by using wireless camera that provides the desired image for the unknown environment . The proposed algorithm is applied on this image to obtain a optimal path for the robot. It is based on the observation and analysis of the obstacles that lying in the straight path between the start and the goal point by detecting these obstacles, analyzing and studying their shapes, positions and
... Show MoreIn the current study, a novel approach for separating ethanol-water mixture by microbubble distillation technology was investigated. Traditional distillation processes require large amounts of energy to raise the liquid to its boiling point to effect removal of volatile components. The concept of microbubble distillation by comparison is to heat the gas phase rather than the liquid phase to achieve separation. The removal of ethanol from the thermally sensitive fermentation broths was taken as a case of study. Consequently the results were then compared with those which could be obtained under equilibrium conditions expected in an “ideal” distillation unit. Microbubble distillation has achieved vapour compositions higher than th
... Show MoreImage compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show More
