مقدمة
تدور الدراسة في علم الاقتصاد المنزلي حول احتیاجات الانسان الضروریة لاستمرار الحیاة ومواقف في محیط
الاسرة وتفاعل مع ظروف البیئة المحیطة بھ .والتي تكون دائمة التغییر لذلك یمكن تعریف علوم وفنون الاقتصاد
المنزلي وفنونھ انھا عبارة عن مجموعة منظمة من المعارف والعلوم تتركز في محور الاسرة والمنزل حیث ینمو
ویتطور الانسان بالعلاقات الانسانیة والنواحي الاقتصادیة والاجتماعیة من جھة والنواحي العلمیة والفنیة الخاصة
بالغذاء من جھة اخرى فضلا عن النواحي العلمیة والفنیھ الخاصة بالمنسوجات والملابس التي تحتاجھا افراد الاسرة
لاتصالھا الوثیق بحیاتھم الیومیة . بحیث یعتقد البعض انھ لایوجد حقل من حقول المعرفة یعنى بحاجات الاسرة
المعاصرة وادارتھا اكثر مما یستطیع تخصص الاقتصاد المنزلي تقدیمھ . ذلك انھ یتنافس مع حقول المعرفة
المتنوعة بجانبیھا النظري والعملي من خلال تطوره المستمر ذو العلاقة بتطور مفردات حیاة الانسان.
إن تطور غایات الاقتصاد المنزلي لھ اھمیة في جعل الفرد یعیش في المجتمع عضواً نافعاً ویساعد غیره من
الافراد . كذلك یساعد على تنمیة المفاھیم والمھارات التي یحتاجھا الفرد في حاضره ومستقبلھ . ومن ھذا المنطلق
جاءت اھمیة تخصص الاقتصاد المنزلي عالمیاً حیث اصبح لھ اقسام وكلیات متكاملة في مختلف البلدان شرقاً وغرباً
. وفي الوطن العربي ھناك كلیات متخصصة في الاقتصاد المنزلي ویدرس بجدیة في مدارس البنات ضمن المواد
الدراسیة في مناھجھا ولھ ثُقلھ الخاص لاھمیتھ للفتیات في حیاتھن ، كما ان ھناك جمعیات عالمیة للاقتصاد المنزلي
في دول مختلفة ومشھورة عالمیاً بالدوریات التي تصدرھا وبمؤتمراتھا الفعالة .
ومع التطور الاجتماعي والتقدم العلمي والتكنولوجي تغیر نمط الحیاة وزادت اھمیة الجانب العلمي لمختلف
انشطة الحیاة . ولذلك تغیر مفھوم الاقتصاد المنزلي ومضمونھ للایفاء بالاحتیاجات الجدیدة للاسرة والمجتمع واصبح
تركیزه حالیاً على الجانب العلمي وجعل الاسرة محوراً للدراسة فضلاً عن المرونة وسھولة التكیف للتغییرات التي
تمس حیاة الاسرة والمجتمع .
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThe research aims to identify the definitional framework for accounting violations and audit procedures in accordance with international auditing standards, preparing a proposed audit program to audit violations resulting from the transition to the unified accounting system in the research sample according to the relevant international auditing standards, as the proposed audit program was prepared according to International auditing standards in order to improve the auditor’s procedures in detecting accounting violations when auditing the financial statements of municipal departments. The research concluded the most important recommendations: The necessity of adopting the audit program proposed by the researcher, for the purpose of act
... Show MoreA Destructive Parenthood : The Problematic Motherhood in Selected Poems by Salvia Plath
The current study aims to examine the level of cognitive management requirement among the governmental secondary schools' managers in al-hial province in the kingdom of Saudi Arabia. To do this, the author designed a questionnaire comprised (20) item which was applied on (250) managers included (113) manager hold bachelor degree and (137) manager hold master degree. To carry out this study, the researcher utilized the descriptive approach. The findings revealed that a high level of cognitive management requirements among secondary schools' managers as well as there is a significant difference at the (0.05) level regarding degree type, but there is no a significant difference according to gender variable.
Societies developed throughout history with the development of life technology, that ideas presented by the contemporary art have been crystallized. The development included all the artistic fields such as the dramatic arts which depend on many effects and elements that led to the completion of the structure of the theater show. Scenography is considered one of the most important elements that the theatre show depends on such as the decoration, lighting, sound effects, costumes and accessories. The research addressed the following question: what are the characteristics and traits of scenography in the theatre show?
The research importance has become clear because it sheds lights on the characteristics of scenography in the Iraqi thea
Abstract
Travel Time estimation and reliability measurement is an important issues for improving operation efficiency and safety of traffic roads networks. The aim of this research is the estimation of total travel time and distribution analysis for three selected links in Palestine Arterial Street in Baghdad city. Buffer time index results in worse reliability conditions. Link (2) from Bab Al Mutham intersection to Al-Sakara intersection produced a buffer index of about 36% and 26 % for Link (1) Al-Mawall intersection to Bab Al- Mutham intersection and finally for link (3) which presented a 24% buffer index. These illustrated that the reliability get worst for link
... Show MoreThe problematic of the current research marked (style between alienation and westernization in contemporary painting) is demonstrated by the fact that the stylistic forms in art are full of the influx of subjective and emotional impressions, as well as administrative and borrowing techniques, as well as their contextual meaning, whether cultural, social and political, which gives them an alien dimension at one time or another. The aim of the research is: Define the style between alienation and alienwesternization in contemporary painting. The research included six axes dealing with the first axis: an introduction to the concept of alienation, and the second axis dealing with the style in romanticism. The third dealt with: the method in i
... Show MoreDifferent frequency distributions models were fitted to the monthly data of raw water Turbidity at water treatment plants (WTPs) along Tigris River in Baghdad. Eight water treatment plants in Baghdad were selected, with raw water turbidity data for the period (2008-2014). The frequency distribution models used in this study are the Normal, Log-normal, Weibull, Exponential and two parameters Gamma type. The Kolmogorov-Smirnov test was used to evaluate the goodness of fit. The data for years (2008-2011) were used for building the models. The best fitted distributions were Log-Normal (LN) for Al-Karkh, Al-Wathbah, Al-Qadisiya, Al- Dawrah and, Al-Rashid WTPs. Gamma distribution fitted well for East Tigris and Al-Karamah WTPs. As for Al-
... Show MorePolyethersulfone (PES) ultrafiltration membrane blending NaX zeolite crystals as a hydrophilic additive was examined for zinc (II) and lead ions Pb (II) removal from aqueous solutions. The effect of NaX zeolite content on the permeation flux and removal efficiency was studied. The results showed that adding zeolite to the polymer matrix enhanced the permeation flux. The permeation flux of all the zeolite/PES matrix membranes was higher than the pristine membrane. No significant improvement was observed in the removal of Zn (II) ions using all prepared membranes as the removal percentage did not raise above 29.2%. However, the removal percentage of Pb (II) ions was enhanced to 97% using a membrane containing 0.9%wt. zeolite. Also, it was
... Show More