Preferred Language
Articles
/
jcoeduw-1292
Ready-made clothes for students of the University of Baghdad between reality and ambition ( A field study )
...Show More Authors

     تعد الملابس وسيلة هامة لكل مايقوم به الانسان في حياته العامة ، فهي الانطباع والكلمة الخارجية عن ذاته الداخلية فهي تعكس فكرة الفرد عن ذاته وعن شخصيته , كما تعد وسيلة تعبير جمالية وفنية , فهي تساعد على اخفاء عيوب الجسد وابراز محاسنه . ويتوقف اختيار الفرد لملابسه على مجموعة  عوامل منها احتياجه , قدراته المالية , سنه , مركزه الاجتماعي , طبيعة عمله ,الظروف الجوية التي يعيش فيها وعلى مايُؤمن به من قيم و معتقدات .

    والملابس خاصة الجاهزة منها تلعب اليوم دوراً هاماً في دولاب ملابس الافراد عامة والفتيات في المرحلة الجامعية خاصة لكثر توافرها في الاسواق وتعدد نماذجها وملحقاتها ( اكسسواراتها ) الجذابة , والتي اصبحت بكافة تفاصيلها جزء من حياتهن فهي تشغل وقتهن وتفكيرهن وينفقن جزء لابأس به من الميزانية لاقتنائها فضلا عن الجهد المبذول في البحث عما يناسبها من ملابس للظهور بأبهى صورة في مجتمعهن , لذا فلا بد من رؤية مستقبلية  لانتاج جيل جديد من الملابس الجاهزة التي تواكب متغيرات الموضة وتستجيب لمعايير تناسق الألوان والأشكال تكون مزودة بتكنولوجيا متطورة تحفظ صحة وسلامة مرتديها في ظل التكنولوجيا الهائلة في مجال الملابس , مثل تزويد الاقمشة المستخدمة في صناعة الملابس الجاهزة باسلاك واقراص مرنة قابلة للغسيل يتم تركيب موصلات إلكترونية ومجسات في الملابس حيث تقوم أجهزة القياس بتسجيل النبض وحرارة الجسم ورطوبته وغيرها من الوظائف التي تحمي وترضي الاشخاص .   

View Publication
Publication Date
Thu Jun 22 2017
Journal Name
Research Journal Of Pharmaceutical, Biological And Chemical Sciences
Testing the Efficiency of Probiotic in Reducing the Growth of Aspergillus flavas in Corn Stored and its Effect on Performance of Broiler
...Show More Authors

This study has been done for testing the effectiveness and efficiency of probiotic in its ability to inhibit Aspergillus flavus , which secretes the aflatoxin B1 and compare it with materials that were approved to be effective in the inhibition of the growth of fungi and break down and reduction of mycotoxin. these are the filax substance and ozone gas. A laboratory experiment has been conducted to determine the isolates out of the fungus producing the aflatoxin B1.the isolate producing aflatoxin B1 has grown on the yellow corn seed. the probiotic was added along with the filax and they have been exposed to ozone gas and then they were stored from 30 days. A bio test was con conducted to knw the effects of biological toxin on the broiler me

... Show More
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 22 2022
Journal Name
Fine Art Journal
Spatial relationships and their impact on monumental sculptures (arab capitals as a model)
...Show More Authors

The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Toward Improving BIM Acceptance in FM: A Conceptual Model Integrating TTF and TAM
...Show More Authors

Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Al Adab Journel
Gender Struggle and Women's Predicament in Tennessee Williams' A Street Car named Desire
...Show More Authors

Abstract The aim of this paper is to shed light on the theme of Gender Struggle and Women’s Predicament in Tennessee Williams’ A Street Car Named Desire .The paper tries to show William's dealings with the critical social themes like Men's Brutality and women's predicament. The paper exposes the complete shift of the balance of power between the genders in America after the two world wars. Williams illustrates society’s changing attitudes towards masculinity and denounces the society's attitudes towards women in America at that time. He rebels against the cruelty of the modern age and regrets the disintegration of the values of the south and their being replaced by the disruptive forces of modern life. In the end of the play, brutalit

... Show More
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Applied Nursing Research
Examining perceived and actual diabetes knowledge among nurses working in a tertiary hospital
...Show More Authors

View Publication
Scopus (30)
Crossref (31)
Scopus Clarivate Crossref