Graphic design constitutes the human necessity for the design action, so there is no design achievement that is not considered in its founding project and its final realization as a response to a specific necessity. As a result of knowledge, which is the product of experience and is the result of applied science, design is based on observation, study and development, leading to the main goal, which is the utilitarian and aesthetic function that is put into the final consideration of design, and drug packaging design has an important role in all marketing fields, as companies compete with each other to attract the largest number Possible from consumers in a way that guarantees them material profit, and in order to achieve this, it always seeks to develop its products and distinguish them from the products of other competing companies by taking care of designing the product packaging and gaining confidence for the consumer and good reputation by choosing good packaging designs for implementation according to the available human, technological and material capabilities. The successful case for the cover is the result of a joint work between (the designer and the consumer). Based on the aforementioned, the researcher identified her research problem and is summarized by the following question: What are the design features of the medicine packaging for children? As for the importance of the research, it is divided into two types:
a. Theory: It can contribute to providing libraries for the benefit of students and researchers in this field.
B. Practical: He can seek the benefit of the relevant authorities, including companies specialized in the pharmaceutical industry.
It included the objective of the research, the limits of the research, and in addition to defining the most important terms. As for the second chapter, it included the theoretical framework that the researcher divided into three sections, namely the first topic: It included the design of medicine packaging packages, the functional dimensions of the medicine packaging. And the second topic: It includes the characteristics of designing drug packaging packages, including properties related to content, function and beauty. The most important indicators reached by the researcher, and then I dealt with previous studies.
As for the third chapter: it included the research procedures and the methodology used in analyzing the samples was determined for its scientific suitability in diagnosing the studied phenomenon, and the research community, the research tool, its validity and stability.
As for the fourth chapter, it included the results of the research, conclusions, recommendations and proposals. Among the most important findings of the researcher were as follows:
1. The employment of pharmaceutical packaging designs appeared according to an external vision that has a direct effect on the recipient to show the functional, aesthetic and expressive dimensions of the product.
2. The designer's use of the trademark as an identification identity for the pharmaceutical company’s products, as its effect on the design was the attraction and excitement to achieve visual tension, the promotion and marketing of the product and the function of orientation towards the recipient of the purchase, but it did not establish its supremacy over some packaging packages.
After that, the researcher recommends several recommendations related to the current topic of the research and then the proposals that the researcher came up with. The current research concludes by fixing the sources and annexes and then the abstract in English.
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreThe study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups: a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess
... Show MoreThe study aimed to identify the future thinking skills of university students and which of these skills are prevalent. The sample of the study consisted of (400) male and female students from the university students. In order to achieve the goals of the research, the researcher built a measure of future thinking skills based on Torrance theory (2003). Psychometric properties of the standards were extracted, which are represented by honesty and consistency and the application of the measures to the research sample. The researchers found that Future thinking skills of university students, and that the skill of future planning is the most common skill among the research sample.
The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
AR Al-Heany BSc, PKESMD MSc., PSAANBS PhD, APAANMD MSc., DDV, FICMS., IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2014 - Cited by 14
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreChalcogenide glasses SeTe have been prepared from the high purity constituent elements .Thin films of SeTe compound have been deposited by thermal evaporation onto glass substrates for different values of film thickness . The effect of varying thickness on the value of the optical gap is reported . The resultant films were in amorphous nature . The transmittance spectra was measured for that films in the wavelength range (400-1100) nm . The energy gap for such films was determined .
NAA Mustafa, Journal of the Sixth Conference of the Faculty of Languages, 2010