STUDY ON EFFICIENCY OF VENETIAN BLINDS WITH SLATS HAVING DIFFERENT ANGLES
نویسندگان
چکیده
منابع مشابه
A study of operators’ computing efficiency with special focus on the readability under different viewing angles of a desktop
The main objective of this work is to determine the reading performance of operators’ under different viewing angles of a desktop computer. The effects of text/background color, viewing distance and character size on the speed of reading were investigated. The text and/or the background color combination were varied, with constant luminance contrast. Performance was recorded in terms of words p...
متن کاملBi-directional Light Transmission Properties Assessment for Venetian Blinds: Computer Simulations Compared to Photogoniometer Measurements
An accurate evaluation of daylight distribution through advanced fenestration systems (complex glazing, solar shading systems) requires the knowledge of their Bi-directional light Transmission Distribution Function (BTDF). An innovative equipment for the experimental assessment of these bi-directional functions has been developed, based on a digital imaging detection system. An extensive set of...
متن کاملa study on construction of iranian life tables: the case study of modified brass logit system
چکیده ندارد.
15 صفحه اولthe effect of task cognitive complexity and time limit on the performance of the learners with different proficiency levels in second language writing skill
this study investigated the effects of manipulating the cognitive complexity of tasks along +/- few elements and the time limits on l2 learners writing performance. to conduct the study, 60 iranian efl learners with two levels of proficiency, low and high intermediate, were selected and assigned to three groups based on the time devoted to task completion. the participants performed both a simp...
15 صفحه اولstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Architecture and Planning (Transactions of AIJ)
سال: 1998
ISSN: 1340-4210,1881-8161
DOI: 10.3130/aija.63.17_3