This paper deals with the subjective reflections of consumer values on fashion design. The consumer self is determined by the consumer's idea of himself, according to the intellectual, spiritual and social values, and these values take their intellectual reflection in the form of material values that the consumer finds in fashion design. These values are based on considerations between what is intellectual represented by the values of the consumer, and what is material determined by the fashion design, which also proceed from values that are visible or implied in costume design, such as the function, beauty and symbol. The consumer self gets its material image represented in the fashion design when the macroscopic apparent values represent one or more of the values of the consumer
Most cultivars of sorghum have low field emergence as common problem. Three experiments were carried out at Agriculture College, Baghdad University. First experiment was conducted in laboratory according to Complete Randomized Design (CRD) with four replicates. Second and third experiments were conducted at field according to Randomized Complete Block Design (RCBD) during the spring and the fall seasons of 2015, respectively, with four replicates for each one. Same two factors were studied at each experiment. First factor was seed priming by seed soaking for 10 hours in distilled water, solvents of GA3, KCl and thiamine (300, 40 and 30 mg*L-1, respectively) and non-primed seed. Second factor was three cultivars of sorghum (Inqath, Kafier an
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreBackground: Surgery is one and may be the most effective method to treat obesity. In the last decade, Laparoscopic Sleeve Gastrectomy is perceived to be less invasive, technically simple, less morbid and more popular form of bariatric surgery.
Objectives: This study aims to assess the effect of Laparoscopic Sleeve Gastrectomy on Fasting Blood Glucose Levels and Blood Pressure.
Methods: A prospective controlled study in which 50 obese patients were involved, 36 of patients have hypertension and type 2 diabetes mellitus , 7 patients have type 2 diabetes mellitus only, and 7 patients don’t have hypertension or type 2 diabetes. All patients were submitted to Laparosco
... Show MoreThis research is devoted to design and implement a Supervisory Control and Data Acquisition system (SCADA) for monitoring and controlling the corrosion of a carbon steel pipe buried in soil. A smart technique equipped with a microcontroller, a collection of sensors and a communication system was applied to monitor and control the operation of an ICCP process for a carbon steel pipe. The integration of the built hardware, LabVIEW graphical programming and PC interface produces an effective SCADA system for two types of control namely: a Proportional Integral Derivative (PID) that supports a closed loop, and a traditional open loop control. Through this work, under environmental temperature of 30°C, an evaluation and comparison were done for
... Show MoreThe aim of the current study is to demonstrate the effect of honey on the sperms characteristics (sperm concentration, sperm motility, grade of activity and sperm normal morphology) as well as pregnancy rate in mice. Sperms were obtained from caudal epididymis of male mice and prepared by adding10% of honey to the IVF medium using direct sperms activation technique for 30 minute incubation period before artificial insemination.
The study revealed a significant (P > 0.05) increase in active sperm motility (grade A and grade B) 49% and pregnancy rate 53.3% in female mice artificially inseminated with sperms. On the other hand, there were no significant differences in sperm con
... Show MoreThe holmium plasma induced by a 1064-nmQ-switched Nd:YAG laser in air was investigated. This work was done theoretically and experimentally. Cowan code was used to get the emission spectra for different transition of the holmium target. In the experimental work, the evolution of the plasma was studied by acquiring spectral images at different laser pulse energies (600,650,700, 750, and 800 mJ). The repetition rates of (1Hz and 10Hz) in the UV region (200-400 nm). The results indicate that, the emission line intensities increase with increasing of the laser pulse energy and repetition rate. The strongest emission spectra appeared when the laser pulse energy is 800mJ and 10 Hz repetition rate at λ= 345.64nm, with the maximum intensi
... Show MoreFaintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.
An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show More