Graphic design constitutes the human necessity for the design action, so there is no design achievement that is not considered in its founding project and its final realization as a response to a specific necessity. As a result of knowledge, which is the product of experience and is the result of applied science, design is based on observation, study and development, leading to the main goal, which is the utilitarian and aesthetic function that is put into the final consideration of design, and drug packaging design has an important role in all marketing fields, as companies compete with each other to attract the largest number Possible from consumers in a way that guarantees them material profit, and in order to achieve this, it always seeks to develop its products and distinguish them from the products of other competing companies by taking care of designing the product packaging and gaining confidence for the consumer and good reputation by choosing good packaging designs for implementation according to the available human, technological and material capabilities. The successful case for the cover is the result of a joint work between (the designer and the consumer). Based on the aforementioned, the researcher identified her research problem and is summarized by the following question: What are the design features of the medicine packaging for children? As for the importance of the research, it is divided into two types:
a. Theory: It can contribute to providing libraries for the benefit of students and researchers in this field.
B. Practical: He can seek the benefit of the relevant authorities, including companies specialized in the pharmaceutical industry.
It included the objective of the research, the limits of the research, and in addition to defining the most important terms. As for the second chapter, it included the theoretical framework that the researcher divided into three sections, namely the first topic: It included the design of medicine packaging packages, the functional dimensions of the medicine packaging. And the second topic: It includes the characteristics of designing drug packaging packages, including properties related to content, function and beauty. The most important indicators reached by the researcher, and then I dealt with previous studies.
As for the third chapter: it included the research procedures and the methodology used in analyzing the samples was determined for its scientific suitability in diagnosing the studied phenomenon, and the research community, the research tool, its validity and stability.
As for the fourth chapter, it included the results of the research, conclusions, recommendations and proposals. Among the most important findings of the researcher were as follows:
1. The employment of pharmaceutical packaging designs appeared according to an external vision that has a direct effect on the recipient to show the functional, aesthetic and expressive dimensions of the product.
2. The designer's use of the trademark as an identification identity for the pharmaceutical company’s products, as its effect on the design was the attraction and excitement to achieve visual tension, the promotion and marketing of the product and the function of orientation towards the recipient of the purchase, but it did not establish its supremacy over some packaging packages.
After that, the researcher recommends several recommendations related to the current topic of the research and then the proposals that the researcher came up with. The current research concludes by fixing the sources and annexes and then the abstract in English.
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
This study involved the treatment of textile wastewater contaminated with direct blue 15 dye (DB15) using a heterogeneous photo-Fenton-like process. Bimetallic iron/copper nanoparticles loaded on bentonite clay were used as heterogeneous catalysts and prepared via liquid-phase reduction method using eucalyptus leaves extract (E-Fe/Cu@BNPs). Characterization methods were applied to resultant particles (NPs), including SEM, BET, and FTIR techniques. The prepared NPs were found with porous and spherical shapes with a specific surface area of particles was 28.589 m2/g. The effect of main parameters on the photo-Fenton-like degradation of DB15 was investigated through batch and continuous fixed-bed systems. In batch mode, pH, H2O2 dosage, DB15 c
... Show More<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe
... Show MoreThe searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time. Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle to involve four types of binary code books (i.e. Pour when , Flat when , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding procedure, with very small distortion per block, by designing s
... Show MoreThe spectrum of clinical efficacy of Methotrexate (MTX) is broad in that MTX is used in the treatment of certain cancers, severe psoriasis and rheumatoid arthritis.Various mechanisms by which cancer cells grown in tissue culture become resistant to anticancer drugs. The use of multiple drugs with different mechanisms of entry into cells and different cellular targets allows for effective chemotherapy and high cure rates. In an efforts to develop effective strategies that increase the therapeutic potential of anticancer drugs with less systemic toxicity ,are being directed towards the investigation of dietary supplements and other phytotherapeutic agents for their synergistic efficacy in combination with anticancer drugs. A promi
... Show More