Fabric design is one of the arts in which humans participate functionally and aesthetically. Researching its design aspects is an important goal, especially after taking technical developments to cover many of its fields. Modern designs emphasize the importance of preparing designs and implementing them according to the child’s ability, inclinations and desires (mental, psychological and emotional). ), as the child is the real focus of the design idea, and the designer has paid most of his attention to the requirements and needs of this stage (childhood stage) because of its importance in the life of society, as he focused his attention on implementing designs that could achieve stability and stability in the child’s psyche through shapes Accordingly, the current research was based on the imposition of the following question: What are the aesthetic values and design foundations in the designs of fabrics and children’s fashion?The research also dealt with three sections, the first topic included the methodological framework in posing the problem, its importance and objectives as well as the definition of the most important terms, and the second topic included The theoretical framework, which included the following topics: First: Aesthetic value and its perception among children and its role in the designs of fabrics and fashion Second: The foundations of art Mimeh for children's fabric designs. As for the third topic, it included the research procedures to reach the objectives of the research, and it relied on the analytical description method, then the most important results and recommendations were included, and finally the sources and references were confirmed.
Geomorphology is concerned with the topographic units that make up the Earth's surface. These take many forms, such as mountains and rivers, and include many dangers such as landslides, landslides and erosion. Many studies appeared in this field to analyze its effects and risks resulting from it, including urban studies, to determine the trends of optimal urban expansion and its geomorphological interactions. The results showed that the city of Kut originated and expanded near the course of the Tigris River and its branches, and it suffers from unbalanced urban expansion, due to the high rate of population growth, and overcrowding in housing units with the growth of urban land uses in it, which prompted the city to extend horizontally and v
... Show More
Purpose: Providing practical knowledge of the requirements of a detailed feasibility study for selecting the investment project.
Findings: Directing the private sector towards investing in productive projects - the pre-cast reinforced concrete project - as it achieves a financial return as well as providing Providing foreign currencies by reducing imports and exploiting available natural resources
Practical implications: The importance of a detailed feasibility study to determining whether the project can be implemented or not.
The precast concrete method is one of the best modern c
... Show MoreThe performance evaluation process requires a set of criteria and for the purpose of measuring the level of performance achieved by the Unit and the actual level of development of its activities, and in view of the changes and of rapid and continuous variables surrounding the Performance is a reflection of the unit's ability to achieve its objectives, as these units are designed to achieve the objectives of exploiting a range of economic resources available to it, and the performance evaluation process is a form of censorship, focusing on the analysis of the results obtained from the achievement All its activities with a view to determining the extent to which the Unit has achieved its objectives using the resources available to it and h
... Show MoreThere is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into
... Show More This study includes Estimating scale parameter, location parameter and reliability function for Extreme Value (EXV) distribution by two methods, namely: -
- Maximum Likelihood Method (MLE).
- Probability Weighted Moments Method (PWM).
Used simulations to generate the required samples to estimate the parameters and reliability function of different sizes(n=10,25,50,100) , and give real values for the parameters are and , replicate the simulation experiments (RP=1000)
... Show MoreCentralization and decentralization, planning and development, and community participation in the management of its affairs and to activate all the abilities that multiple methods aimed at creating the proper environment for the growth and development of society in the place where he lives. As long as the overall trend in Iraq, represented by the Permanent Constitution of decentralization to regions and provinces, the solutions to the obstacles that may face this transition in some respects presents ways of coordination and integration between multiple levels of planning which can be exercised by the schematic in the future the organization. In this paper some of the visions and ideas that can contribute to the organization
... Show MoreThe research is based on an important subject according to the researchers' estimations. It is the disclosure of the nature of the relationship between Watching to cultural programs in satellite channels and the book's vision of the intellectual, and the pursuit of purchasing and acquiring it It is a scientific addition to the scientific research media because it deals in the field of new about the nature of the relationship between satellite programs and writers, and it provides a scientific development on the importance of satellite channels in the promotion of the book and sales of intellectual elite. The study examined the audience of the recipients of literature for cultural programs, the nature of the public, characteristic
... Show MoreABSTRACT
The research aims to analyze the value chain of dairy products in Iraq (Abu Ghraib/Study Case) factories for the year 2022, where value chain rings are identified to discuss and track the most important determinants and problems in the value chain rings of dairy products and their basic and secondary activities, as well as calculate the value added of the products by subtracting the total revenues of products from their variable costs. Research data were collected for the period 2022. Preliminary information and data from its field sources and personal interviews were collected through a questionnaire prepa
Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of Messengers, and upon his family and companions
And whoever follows his guidance until the Day of Judgment. As for what follows: Islamic law commands Muslims to unite, reject disagreement, and not dispute, and to spread the spirit of tolerance and love among them. God Almighty said: “And hold fast to the rope of God all of you and do not become divided, and remember the favor of God upon you when you are enemies and He has joined your hearts.” So, by His grace, you became brothers (1), and He said: (And You will be like those who became divided and disagreed after the clear proofs had come to them. It is they - for them is a great punishment.) (2
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More