The history of civilizations in the past centuries is a rich source for creativity and inspiration in all areas of art and design, especially in the field of fashion design. Many designers draw their designs from previous eras; which is the aim of this research as we propose designing fashion the mannequin for the category of young girls aged between (10-18). The costumes were inspired by Victorian women's costumes during the time period (1860-1890) and were subdivided into three time periods (1860-1870), (1870-1880), (1880-1890) forming three designs for each time period , analyzing the nine designs to achieve the creative , functional and aesthetic aspects that are appropriate for the age group (research sample). The importance of the research lies in it being an analytical historical study. The implementation of the designs depends on the method of formation on the mannequin of the young age group, which makes it different from studies that always rely on the formation women mannequin. The pieces were referred by the faculty members of Umm Al-Qura University, the Department of Fashion Design. The results revealed that there are statistically significant differences between the nine designs in terms of the design elements, basis and principles of the design, functional, creative and aesthetic sides. Design number 4 met the design requirements with a percentage of 44.275; design number 2 met the principles of the design scoring 39.437%; design number 9 scored 53.037% in regards to practicality; design number 4 obtained 34.125 on the aspect of creativity and design number 9 accumulated 58.8% on the aesthetic side.
The paper concludes with recommendations to conduct further studies that link the Draping method on the mannequins and the field of fashion history in different civilizations. Attention to the Draping of fashion on the mannequins for the category of young girls
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreThe main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from
... Show MoreThis research aims at clarifying the concept of social auditing, which is one of the most important reasons for its emergence is social responsibility accounting and its role in measuring the social performance of enterprises. The study also aimed to know how social auditing has an impact and its role in improving the social performance of business organizations, and the research refers to testing the hypotheses of an impact of social auditing on social performance through a commitment to social responsibility. The research sample consisted of 200 individuals from 20 Algerian business organizations and represented individuals who were researched in managers and em
... Show MoreThe weak and strong forms are so called because it is not their lexical content that primary matter, but the role they have in the sentence. The problematic confusion, our students encounter, in recognizing and producing the correct pronunciation of weak and strong forms of the English function words is the main incentive behind conducting this study. In order to gather the data, this paper used two types of tests: a recognition test and a production test. The general results reached through the analysis of the students' answers seem to conform to the researcher's assumption: students face a critical problem in recognizing and producing correct pronunciation of the weak and strong forms of the English funct
... Show MoreLiterature on the use of the first-person pronoun in abstracts and conclusion sections of final-year projects is limited. In case of Algerian Master students, it is too scant. The present paper aims at filling this gap through a study concerned with students’ and engagement in their final projects (memoirs). This quantitative study examines the use of “we” and its various types, “our- us-I, my, the researcher” in memoirs chosen at random from the d-space portal of the University of Adrar, southern Algeria. Sixty-five papers, submitted in the fields of Linguistics or didactics between 2015 and 2020 and representing nearly half of the whole memoirs’ depository at the library’s d-space, constituted the corpus of study. The des
... Show MoreBackground: White spot lesion is the first visible sign of dental caries that is characterized by demineralized lesion underneath an intact surface. Several studies demonstrated that they could be treated using noninvasive techniques like the use of fluoride or casein phospho-peptide and amorphous calcium phosphate. Improvement in aesthetic outcomes by covering the demineralized enamel is one of the advantages of the use of resin infiltration and opal-ustre microabrasion, which are two new techniques that had been used for treatment of white spot lesion. The purpose of this study was to evaluate the impact of resin infiltration and microabrasion in the microhardness of the artificial white spot lesions at various depths. Material and method
... Show MoreNumerical simulations have been carried out on the solar chimney power plant systems. This paper gives the flow field analysis for a solar chimney power generation project located in Baghdad. The continuity, Naver-stockes, energy and radiation transfer equations have been solved and carried out by Fluent software. The governing equations are solved for incompressible, 3-D, steady state, turbulent is approximated by a standard k - model with Boussiuesq approximation to study and evaluate the performance of solar chimney power plant in Baghdad city of Iraq. The different geometric parameters of project are assumed such as collector diameter and chimney height at different working conditions of solar radiation intensity (300,450,600,750
... Show MoreIn this study is the phenomenon of desertification risk assessment in the Abu Ghraib area west of Baghdad/Iraq, which has an area of about (384.168 km 2), that the annual mean temperature is more than (22 C). Rainfall was low, ranging from the (200 mm) per year for Iraq and (2.82) mm per year of the study area* temperature is high and evaporation is also high (mm 7.73) per year*, so the climate in general of the dry type and the system of soil moisture is the kind of Aridic (Torric). To this study was to identify three indicators to monitor for the period from 2001-2005 using GIS and these indicators are (soil, groundwater and the nature of land use), using ArcGIS 9.1. The results showed that the risk of desertification was part of the leve
... Show More