Any design subject to a set of forces contributing to the establishment of relations working to strengthen the internal elements of the design; any imbalance in these elements can make a fragmented and weak design, thus preventing it from achieving the goal or performance. Poor performance can be attributed to various factors: the extent and function of the elements and principles in the design, realization of the idea, especially in fashion design.
Moreover, there are many aspects of a design that go into achieving the realization of the designer’s idea. The design utilizes a lot of stimulants by drawing attention to its design, which is consistent with the need for psychological and material individuals. In this research, we will analyze the most important elements and relations that contribute to the idea, and then provide an analysis of the technical and functional aspects of the design
يختبر البحث الحالي علاقة الأثر والارتباط بين إدارة المعرفة التنظيمية (المتمثلة قيادة المعرفة، تنظيم المعرفة، عمليات المعرفة، ثقافة المعرفة، تطبيق المعرفة، تقاسم المعرفة) ومتغير (رأس مال الزبون) في مجموعة من المصارف الأهلية في محافظة النجف إذ تمثلت مشكلة الدراسة بمدى دور إدارة المعرفة في هذه المصارف فضلاً عن الزبائن الذين يتعاملون معها، وقد استخدمت استمارة الاستبيان كأداة رئيسة لجمع البيانات إذ تم تو
... Show Moreتهدف هذه الدراسة إلى معرفة الفرق في التحصيل الدراسي في الكيمياء والاتجاه نحو العلوم بين طلاب التخصص العلمي وطلاب التخصص الصناعي الصف الأول كلية التربية ابن الهيثم، كذلك تهدف الدراسة إلى معرفة العلاقة بين التحصيل الدراسي في الكيمياء ودرجات اختبار نهاية الفصل في الكيمياء، والمعدل التراكمي بعد أخذ المقرر الدراسي والاتجاه نحو العلوم بالنسبة لطلاب التخصص العلمي وطلاب التخصص الصناعي.
لقد است
... Show MoreThe study aimed to evaluate educational programs efficiency in applying the best educational practices to educate students from the dangers of indecent behaviors, in line with higher education policy and the appropriateness of educational program dimensions to spread awareness among students to not fall into the indecent behaviors clutches. The study adopted the inductive exploratory approach through structural equation modeling and the descriptive analysis of the collected data from randomly selected sample (n=385) from educational academics at Northern Border University in the Saudi Arabia using a specially designed survey tool to meet study purposes to evaluate dimensions of teaching methods, evaluation tools, training courses, course
... Show MoreThe search in these subjects makes an importanl accomplishment in the study of the scientific life in that (era) specialy what the wonen had from a scientific and social level in that(age) the studies of the scientestis which were brilliant in the this era never hed the same as the first scientests . because of the common mistakes toward some resesrchers
Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show MoreThis research includes an analytical and critique study for the version of the University Service Law No.23 for the year 2008, containing all its aspects and failure whether in its legislation or its applications.
Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show More