The present research deals with the study of the symmetries of the design of interior spaces in fast food restaurants in terms of formality as it is an important element and plays a direct role in the spatial configuration, which is designed in both of its performance, aesthetic and expressive aspects. Since the choice of shapes is a complex subject that has many aspects imposed by functional and aesthetic correlations, the problem of the research is represented by the following question: (To what extent can the symmetries of the interior design be used in the spaces of fast food restaurants?)
The research acquires its importance by contributing to the addition of knowledge to researchers, scholars, companies and the specialized public institutions and those relevant in the field of interior design to benefit from them to develop fast food restaurants through awareness of the role of formal symmetries to achieve the performance and aesthetic aspects of users of these spaces of workers, visitors and tourists. The objective of the research is to identify the formal symmetries in the designs of the interior spaces of fast food restaurants.
The theoretical framework has been defined by two sections: the first of which is "the formal symmetries in the design of interior spaces", while the second section includes "the interior design of fast food restaurants". The results and conclusions of the research have been reached through the approved research procedures and methodology.
The most important conclusions are: 1 - There is a clear absence of golden proportions in the formal symmetries of the dimensions of some walls and windows. 2 - The modular system acts as a proportional system in determining the dimensions of the entrance and areas of movement in the interior spaces of the restaurants and in determining the forms of sitting units, chairs and tables that contribute to the impact on the human psyche to stay for a limited period.
The current study is unique in its emphasis on investigating design operation and concept from multiple scientific perspectives: including invention, technique, and design components. This research tends to study the methodology and creation of design process in a holistic manner so that the readers may grasp their characteristics and properties down to its minute epistemological detail. The investigation of the design concept is where the real groundwork and pressing need for the study begin. Creation and methodology are two primary concepts in relation to design these relationships can be formed in any design because of the various forces that act upon it. The primordial objective of this study is to evaluate the relationship betw
... Show MoreObjective: The study aims at assessing the food frequency intake and dietary habits for diabetic pregnant
women.
Methodology: A descriptive study is carried out for the period from November4th 2013 to August
25th 2014. A purposive "non-probability" sample of one hundred diabetic pregnant women is selected from
the Diabetic and Endocrine Center in Al-Amarha City. A questionnaire is developed as a tool of data
collection. Content validity of the study instrument is determined through panel of experts. Split-half
reliability technique is used for reliability determination of the study instrument which depicts a reliability
coefficient of (0.79) for the entire scale. A structured interview with each diabetic pregnant wom
A strong sign language recognition system can break down the barriers that separate hearing and speaking members of society from speechless members. A novel fast recognition system with low computational cost for digital American Sign Language (ASL) is introduced in this research. Different image processing techniques are used to optimize and extract the shape of the hand fingers in each sign. The feature extraction stage includes a determination of the optimal threshold based on statistical bases and then recognizing the gap area in the zero sign and calculating the heights of each finger in the other digits. The classification stage depends on the gap area in the zero signs and the number of opened fingers in the other signs as well as
... Show MoreSearch marked (the reflection of diode technology light emitting (LED) on the modular design of external lighting) is an analytical study of the units, external lighting for gardens and adopted in its work on the diode technology emitting light to reach the magnitude of the effect and the change happening where according to this technique was the problem of the research in which is (what emotion the formal and functional units of external lighting according diode technology light emitting) and identified in the first part of it, including the goals came Search of b (statement reversal winning technical transformation of lighting from incandescent bulbs to light emitting diode technology (LED) on each of shape design and the nature of the
... Show MoreAbstract
The aim of the research to define the concept of moral intelligence and its dimensions and its relationship to some personal characteristics with the internal auditors and identify the importance of the employment of moral intelligence dimensions of (empathy, conscience, self- control, respect, kindness, tolerance, fairness) in the internal audit and the extent of support for the performance of the internal audit process in light of these dimensions. And that by answering the following question : Is there a role for moral intelligence of internal auditors in support the performance of internal audit process ? How are employ these dimensions i
... Show MoreIn this research we present An idea of setting up same split plots experiments in many locations and many periods by Latin Square Design. This cases represents a modest contribution in area of design and analysis of experiments. we had written (theoretically) the general plans, the mathematical models for these experiments, and finding the derivations of EMS for each component (source) of sources of variation of the analysis of variance tables which uses for the statistical analysis for these expirements
This study aimed to evaluate the occurrence of microbial contamination in food keeping freezers in some local markets in Baghdad city/ Iraq, as well as the contamination of the hands of workers in markets, and the possibility of contamination caused by the transport of food. 30 samples of snow ice found in food keeping freezers in local markets was randomly collected, and 30 swabs from workers hands were taken from the same markets at the same time. Microbiological examination of ice samples was conducted as well as the hands of workers’swabs, and the bacteria were isolated and diagnosed through microbiological and biochemical tests followed. Microbial test results showed some isolates of bacteria in ice samples obtained from food keep
... Show MoreThe study included examination of three types of different origin and orange juice at the rate of recurring per sample, the results showed that the highest rates of acid (pH) in the A and juice were (4). And salts of calcium is 120 ppm in juice C and 86 ppm of magnesium in the juice B, for heavy metals the highest rate of lead .18 recorded ppm in juice B, 1.32 ppm of copper in juice A, 5 ppm of iron in the juice B, 1.3 ppm of zinc in the juice B, 0.05 ppm of aluminum in each of the sappy B and A, 0.02 ppm of cobalt in the juice B, 0.3 ppm of nickel in the juice B, 170.6 ppm sodium in C juice, but for the acids, organic that the highest rates were 3.2 part Millions of acid in the juice owner a, 260 ppm of the acid in the juice the ascorbi
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show More