The icon and the symbol represent the constituents of the communication process, through their intellectual and philosophical concepts that have been addressed by the current research that it has touched upon their importance in conveying the design idea for the recipient and showing the specificity of each one of them in the communication process. The research problem has been limited by the following question: what are the communication roles that the symbol and the icon present for the user in designing the industrial product?
The research objective is to reveal the theoretical visualization that describes the icon and the symbol in the industrial product and its importance in the communication process through stating the of similarities and differences between them.
The research has been divided into three sections, the first of which is concerned with understanding the iconic indication intellectually, functionally and aesthetically. The second section focused on understanding the sign indication intellectually, functionally and aesthetically. The third section is concluded with the communication process concept in the industrial products through the symbols and icons.
The theoretical framework resulted in a set of indicators that have been adopted in the design of the research tool represented by the form of axes of analyzing the research sample forms. The research community is limited to the smart home appliances of (8) international companies. Then the researcher chose an intentional sample (newel, GOSONIC) and defined two different samples of their products. They have been analyzed according to the specified form for this purpose. A number of results have been extracted including: the use of symbols and icons in the design of the industrial products accomplishes the required communication process in the products in what serves the positive interaction between the industrial products and the recipients.
Background: Pyogenic discitis most frequently occurs
after home delivery, hemorridectomy, and dilatation and
curettage. Discitis is generally due to blood borne bacterial
invasion of the disc from adjacent end-plate via
communicating vessels. Infective discitis remains an
uncommon, but potentially serious cause for back pain.
Delayed diagnosis can occur and a high index of suspicion
may occur.
Methods: The study included 30 patients suffering from
localized low back pain with limitation of movement.
Diagnosis was made by history, physical examination and
investigation mainly E.S.R and MRI.
Results: 50.3% of patient with discitis had a history of
vaginal delivery, 15% had a history of hemorridectomy
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreContrary to deconstruction and its destructive pursuit, the concept of undermining the familiar seeks to refute the constants and its known limitations. It is done through the process of receiving and what is imposed by the formation of the word or text or the structural and design structure in general, along with the Arabic calligraphy in particular. This is based on the recipient's understanding and interpretation of the dual phenomenon and the content's manifestation. More accurately, the disclosure of its reality through its expressive phenomenology; for that sake, the research was devoted to studying “undermining the familiar and embodiment content in Arabic calligraphy” including four chapters. The first chapter comprised
... Show MoreIraq is considered one of the countries most susceptible to the negative impacts of climate change. According to international reports, it is classified as among the top five most affected by climate change in the world, leading to economic resource shortages and an increase in water scarcity, which exposes societal stability in Iraq to a threat. This may result in social disintegration and civil conflicts, so climate changes are considered one of the most dangerous crises affecting societal stability in Iraq during this stage. In this context, the research attempts to trace the causes of climate change and their effects on societal stability in Iraq and suggest some necessary measures to confront them in the future. The resea
... Show MoreChannel estimation and synchronization are considered the most challenging issues in Orthogonal Frequency Division Multiplexing (OFDM) system. OFDM is highly affected by synchronization errors that cause reduction in subcarriers orthogonality, leading to significant performance degradation. The synchronization errors cause two issues: Symbol Time Offset (STO), which produces inter symbol interference (ISI) and Carrier Frequency Offset (CFO), which results in inter carrier interference (ICI). The aim of the research is to simulate Comb type pilot based channel estimation for OFDM system showing the effect of pilot numbers on the channel estimation performance and propose a modified estimation method for STO with less numb
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreBackground/Aim: Psoriasis is a persistent systemic disorder characterised by chronic inflammation and linked to multiple comorbidities, including arthritis, cardiometabolic disorders, obesity and hyperlipidaemia. Objective of this study was to identify the relationship of abnormal lipid profiles and psoriasis, as well as to pinpoint factors that correlate with disease severity. Methods: A cross-sectional study was carried out at the dermatology clinic over 6 months from the 1 August 2024 to the 1 February 2025. Patients aged 15 years and above with a diagnosis of psoriasis were enrolled. For each patient two sets of data were collected, demographical characteristics (age, sex, disease duration and the body mass index (BMI)) and the
... Show MoreThe present work was aimed to form the baseline data of normal morphological and histological structure features of liver in migratory starling (Sturnus vulgaris). Anatomically, the starling liver bird was dark red -brown in colour and located in the cranial third of the abdominal cavity and consisted of undivided lobes (left and right). The liver right lobe was larger than the left. Histological examination revealed that the liver parenchyma was covered by a connective tissue capsule which appears to be thicker in the rim of liver lobes than other area in the liver lobe. Liver parenchyma was arranged in an unlimited hepatic lobules, which composed of polygonal hepatocytes organized as irregular, radial interconnecting cords or laminae of o
... Show MoreThis study is concerned with the recent changes that occurred in the last three years (2017-2019) in the marshes region in southern Iraq as a result of the changes in the global climate, the study included all the water bodies in the five governorates that are located in the southern regions of Iraq (Wasit, Maysan, Dhi-Qar, Qadisiyah and Basrah), which represent the marshes lands in Iraq. Scenes of the Landsat 8 satellite are used to create a mosaic to cover the five governorates within a time window with the slightest difference between the date of the scene capture, not to exceed 8 days. The results of calculating the changes in water areas were obtained using the classifier support vector machine, where high accuracy ratios were recorded
... Show More