STUDY ON EFFICIENCY OF VENETIAN BLINDS WITH SLATS HAVING DIFFERENT ANGLES

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A study of operators’ computing efficiency with special focus on the readability under different viewing angles of a desktop

The main objective of this work is to determine the reading performance of operators’ under different viewing angles of a desktop computer. The effects of text/background color, viewing distance and character size on the speed of reading were investigated. The text and/or the background color combination were varied, with constant luminance contrast. Performance was recorded in terms of words p...

متن کامل

Bi-directional Light Transmission Properties Assessment for Venetian Blinds: Computer Simulations Compared to Photogoniometer Measurements

An accurate evaluation of daylight distribution through advanced fenestration systems (complex glazing, solar shading systems) requires the knowledge of their Bi-directional light Transmission Distribution Function (BTDF). An innovative equipment for the experimental assessment of these bi-directional functions has been developed, based on a digital imaging detection system. An extensive set of...

متن کامل

the effect of task cognitive complexity and time limit on the performance of the learners with different proficiency levels in second language writing skill

this study investigated the effects of manipulating the cognitive complexity of tasks along +/- few elements and the time limits on l2 learners writing performance. to conduct the study, 60 iranian efl learners with two levels of proficiency, low and high intermediate, were selected and assigned to three groups based on the time devoted to task completion. the participants performed both a simp...

15 صفحه اول

study of hash functions based on chaotic maps

توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Architecture and Planning (Transactions of AIJ)

سال: 1998

ISSN: 1340-4210,1881-8161

DOI: 10.3130/aija.63.17_3