Simplification of new fashion design methods
Abstract
In this study, we compare between the autoregressive approximations (Yule-Walker equations, Least Squares , Least Squares ( forward- backword ) and Burg’s (Geometric and Harmonic ) methods, to determine the optimal approximation to the time series generated from the first - order moving Average non-invertible process, and fractionally - integrated noise process, with several values for d (d=0.15,0.25,0.35,0.45) for different sample sizes (small,median,large)for two processes . We depend on figure of merit function which proposed by author Shibata in 1980, to determine the theoretical optimal order according to min
... Show MoreI started writing the research because of the linguistic and rhetorical methods in the Holy Quran.
This Sura included in all its verses the plural form such as the word planets graves and seas except the word sky was singular as the name of a genus, and this Sura showed the horrors of the Day of Judgment at the world level Included another science is the science of the interview and also came in the repetition and deletion and other linguistic and rhetorical things and concluded this Sura that the goal of breaking the sky and scattering planets and scatter graves is the human himself.
The Koran is a miracle immortal and science is still drawn from him each according to his specialty.
The usage of remote sensing techniques in managing and monitoring the environmental areas is increasing due to the improvement of the sensors used in the observation satellites around the earth. Resolution merge process is used to combine high resolution one band image with another one that have low resolution multi bands image to produce one image that is high in both spatial and spectral resolution. In this work different merging methods were tested to evaluate their enhancement capabilities to extract different environmental areas; Principle component analysis (PCA), Brovey, modified (Intensity, Hue ,Saturation) method and High Pass Filter methods were tested and subjected to visual and statistical comparison for evaluation. Both visu
... Show MoreThe recent development in statistics has made statistical distributions the focus of researchers in the process of compensating for some distribution parameters with fixed values and obtaining a new distribution, in this study, the distribution of Kumaraswamy was studied from the constant distributions of the two parameters. The characteristics of the distribution were discussed through the presentation of the probability density function (p.d.f), the cumulative distribution function (c.d.f.), the ratio of r, the reliability function and the hazard function. The parameters of the Kumaraswamy distribution were estimated using MLE, ME, LSEE by using the simulation method for different sampling sizes and using preli
... Show MoreThe management of construction projects needs to complete the basics of system management and work. Starting from the idea and how to turn it into a full study and ended at the construction project completion arriving at the purpose prepared for it, so the projects need to control on its operation and integration system in order to succeed.
It is no secret for who concerned in construction projects field that the design stage is a very important stage in construction project because it determines the final features of the project through the requirements provided by the employer for the consultant to formulate it during this phase in the form of plans, drawings, and specifications, then translated on the ground as the shape of co
... Show MoreThe movement is considered one of the important factors which attracts the receiver attention in designing artificial works in general, and especially in the advertisements, moreover the subject of the movement in the designing advertisements needs more care and study by the scholars. From this importance and from reaching to the basic streams of the research topic (the effect of the movement in the graphic design) the problem of the research has been set according to the following wonder:
- What is the designing process that establishes the movement in the commercial advertisements designs?
The researche
... Show MoreThis research deals with the topic (Fantasy Parody in the Design of the Advertisement) in view of the important role that fantasia plays in designing the most creative and attractive advertisements to the recipients. The research problem lies in accordance with the following question:
What is the Fantasy Parody in the Design of the Advertisement?
It means the imagination, the unfamiliar; and features that emerge for it that distinguish it from other concepts. Fantasy advertisement is creativity in innovative ways, either through collage, merging, or the use of various artistic expressions in terms of intellectual and cultural awareness. When uses in the parody of advertisement, it has helped to come up with an aesthetic experie
Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More