Human interest in negative space has existential roots, in addition to its cognitive value of things. In the environment, it includes space features from facts and activities, as negative space plays an active role in the field of visual perception, and this value comes from the need to absorb vital relationships in its environment, Man represents the positive part of negative space through his presence in this environment, and therefore this is reflected in the design of its types and the function of each element in the design, for the real effectiveness that the elements gain and their impact comes through the negative space that surrounds them and organizes their relationships with other elements, that the orientation is distributed according to the same The relationship, such as inside, outside, closest, and farthest, as well as the separated, united, continuous, and non-continuous, and its function and basic knowledge lies in its meanings and embodiment of structural elements, that the importance of constructive space, and its priorities follow design treatments, so the research problem manifested itself with the following question:
)What is the role of negative space in branding?
With the aim of the research specified in: (to identify the representation of negative space in the design of brands). The theoretical framework was concerned with four topics, the first topic touched on: (the concept of negative space in the design of the brand), while the second topic focused on: (the relationship of negative space with the structure), and the third topic touched on: (negative space in light of the Gestalt theory). The fourth research, B (Design of commercial negative space marks), then four research models were described and analyzed, based on the paragraphs of analysis drawn from the theoretical framework, and the resulting indicators. After that the researcher presented the results and the conclusions reached by the researcher, and from the results:
- Bilingual slogans subscribed to the iconic, formal content of the emblem of the Kingdom of Saudi Arabia, (the two crossed swords are surmounted by a palm tree), as in all samples and at 100%, which in turn contributed to establishing the identity of the emblem and stability in the minds of the receiving audience. The researcher organized the recommendations that he explored in the light of the results of his research, including:
- The need for Iraqi institutions and companies to pay attention to designing bilingual slogans and the slogan in particular to keep pace with the scientific development in the field of design, through the use of academic and specialized designers.
Then the search was appended to the list of sources related to the research ... and the research summary is in English.
My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabr
... Show MoreThe art of synthesis is one of the most important pillars in cinematic art, as the director combines cinematic shots to produce a third shot in the mind of the recipient by various methods such as mental synthesis, analogous synthesis, rhythm synthesis, parallel synthesis and repetitive synthesis, Repetitive synthesis is one of the most important techniques in cinematic montage. Through repetitive synthesis, the director is able to link the shots and scenes with each other, and this is what we see in the poetic imagery of Adnan Al-Sayegh when he links the visual images to each other, especially those images that manifest the manifestations of grief and misery following the misfortunes that befell in His homeland. This study follows the d
... Show MoreBiodiversity is one of the important biological factors in determining water quality and maintaining the
ecological balance. In this study, there are 223 species of phytoplankton were identified, and they are as
follows: 88 species of Bacillariophyta and were at 44%,70 species of Chlorophyta and they were at 29 %, 39
species of Cyanophyta and they were at 16 %, 12 species of Euglenozoa and they were at 4 %, four species of
Miozoa and they were at 3 %, and, Phylum Charophyta and Ochrophyta were only eight and two species,
respectively and both of them were at 2%. The common phytoplankton recorded in the sites studied
include Nitzschia palea, Scenedesmus quadricauda, Oscillatoria princeps, and Peridinium
This research aims to know the reality of implementation of Knowledge Management in Saudi Universities Applied in Shaqra University and to study the difficults whish encountered in applying the Knowledge Management approach.
The study investigated the university staff in Shaqra, Thadig, and Huraymila branches, using a questionnaire designed by the researcher to collect the data, sample of (260) members was used, applying the descriptive analytical approach to test the hypothesis by using (SPSS) program.
The study revealed that the first four zero hypothesis are rejected because there is medium approval of the university members on the fo
... Show MoreThe present study includs the isolation and identification of Keratinophilic fungi in fresh water samples collected from Tigris river in Baghdad, Iraq. Samples were collected from different districts of Baghdad (Al-Rustumia, Madina Al-Teb, Al-Azamia, Al-Kadimia, Al-Dorha and Al-Kanah). The water samples were examined for keratinophilic fungi by the plating method culturing and Hair Baiting Technique. A total number of 18 genera are recorded, in which the Tigris water indicates an impressive diversity of fungi. A variety of fungal strains were isolated from river water, out of 814 fungal colonies, Aspergillus terrus (5.5%) was the most frequent species, followed by Asperg
... Show MoreThe present research aims at recognizing the difficulties and problems which hamper teachers and educators alike when using the internet for educational purposes.It discusses the benefits of the internet as a source of information or publication and as a communicative tool.Arandom sample of (30) teachers working at schools in Baghdad / Second Risafa,was selected.Three of the sample members use the internet for student project plans via internet centers, whereas 16 of them use it for chatting, emailing and research purposes.The rest of the sample have limited knowledge of the internet. The researcher used the interviewing method to gather data from
... Show MoreOne hundred of dialysis patients' mean age ( 51.18±8.28) years and one hundred healthy control group , where carried out from different hospitals of Baghdad city , during the period between November /2012 until March/2013. Blood samples were collected before dialyzing for estimation the concentration of urea, creatinine, uric acid, random blood sugar , calcium and cholesterol by enzymatic method detected spectrophotometerically.
The aim of this study is to determine concentration of urea, creatinine, uric acid, RBS , calcium and cholesterol in hemodialysis patients in Baghdad . The results showed that there were highly significant increases (P<0.01) in the mean of creatinine ,
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Acontaminated ophthalmic solutions represent a potential cause of avoidable ocular infection. This study aimed to determine the magnitude and pattern of microbial contamination of eye drops in out patient at the department of ophthalmology, at Baghdad national hospital, Iraq. Fifty four vials from the out patient clinic were obtained for microbial examination after an average use of 2 weeks. The dropper tip and the residual eye drop were examined for contamination. The specimens were cultured, the number of colonies counted, the organisms identified. Eight (15%) out of 54 analyzed vials were contaminated , most bacteria identi
... Show MoreA sentence is a key part of Spanish grammar and serves as the fundamental unit in constructing discourse. However, foreign language learners, particularly Arabic speakers, may face complex aspects that hinder their understanding and correct use of sentences. Additionally, there are at least two linguistic approaches that describe the use of compound sentences: one considers the sentence as the basic unit for discourse analysis, while other studies, starting with Van Dijk (2003), emphasize the importance of understanding both the partial and holistic structure of discourse. Therefore, we consider the significance of reviewing the linguistic differences between the native language and Spanish as a potential cause of misunderstanding a
... Show More