ملخص البحث: تناول البحث الحالي:(أنظمة التكوين الجمالي للكتابات والنصوص في النحت العربي المعاصر)، عددا من الأفكار الأساسية التي تمثل المادة النظرية لتفسير ظاهرة الكتابة في الفن بشكل عام وفي فن النحت بشكل خاص، ولكشف أنظمة التكوين الجمالي وأنواعها المتعددة من خلال فحص بعض النصوص البصرية للفنانين العرب المعاصرين، فقد جاء هذا البحث في أربعة فصول. خصص الفصل الأول: الإطار المنهجي للبحث لبيان مشكلة البحث، وأهميته، وهدف البحث، ثم حدود البحث الموضوعية والمكانية والزمانية، التي تحددت بالمنحوتات ذات الأشكال الحروفية المنفذة في المنطقة العربية، ثم تحديد المصطلحات. أما الفصل الثاني: الإطار النظري للبحث فقد شمل ثلاثة مباحث خصص الأول منها والموسوم: المفهوم الجمالي للكتابة، لدراسة مفهوم الكتابة من كافة جوانبه النظرية، أما المبحث الثاني الموسوم: أنظمة التكوين الجمالي، فقد تم دراسة أربعة نقاط فيه وهي: أولاً: التكوين الجمالي للكتابة في المنحوتات، ثانياً: حركة عناصر شكل الكتابة في النحت، ثالثاً: التكوين الجمالي للفضاء الخارجي والداخلي، رابعاً: التكوين الجمالي للاختزال. أما المبحث الثالث الموسوم: أنواع التكوينات الجمالية في فن النحت، فقد تم دراسة أربعة نقاط وهي: 1.التكوين الجمالي الدائري والكروي، 2.التكوين الجمالي الأفقي والمستعرض، 3.التكوين الجمالي الطولي والعمودي، 4.التكوين الجمالي الهرمي والمثلث. أما الفصل الثالث: الإطار الإجرائي للبحث فقد شمل على مجتمع البحث وعينته المتكونة من ثلاثة أعمال فنية للفنان إياد الحسيني، وتم اختيار هذه العينة بطريقة قصدية، لتمثل المجتمع الكلي، ولتحقق أهداف البحث وحدوده الموضوعية والمكانية، ثم تحليل العينة. أما الفصل الرابع: نتائج البحث فقد خصص لنتائج البحث التي توصل إليها، كما تضمن الفصل عددا من التوصيات والمقترحات.
The aim of this research is to find the impact of the efficiency of Management information systems (MIS) on the effectiveness of governmental organizations performance.
To achieve the objective of the research, the analytical descriptive method was adopted. A questionnaire was designed consisting of (35) paragraphs, and the sample consisted of (200) individual. The research attemped to answer the following question: To achieve the objective of the research, the analytical descriptive method was adopted. A questionnaire was designed consisting of (35) paragraphs, and the sample consisted of (200) individual. The research tried to answer the following question: What is the actual utilization of modern admi
... Show More“Smart city” projects have become fully developed and are actively using video analytics. Our study looks at how video analytics from surveillance cameras can help manage urban areas, making the environment safer and residents happier. Every year hundreds of people fall on subway and railway lines. The causes of these accidents include crowding, fights, sudden health problems such as dizziness or heart attacks, as well as those who intentionally jump in front of trains. These accidents may not cause deaths, but they cause delays for tens of thousands of passengers. Sometimes passers-by have time to react to the event and try to prevent it, or contact station personnel, but computers can react faster in such situations by using ethical
... Show MoreOne of the most serious health disasters in recent memory is the COVID-19 epidemic. Several restriction rules have been forced to reduce the virus spreading. Masks that are properly fitted can help prevent the virus from spreading from the person wearing the mask to others. Masks alone will not protect against COVID-19; they must be used in conjunction with physical separation and avoidance of direct contact. The fast spread of this disease, as well as the growing usage of prevention methods, underscore the critical need for a shift in biometrics-based authentication schemes. Biometrics systems are affected differently depending on whether are used as one of the preventive techniques based on COVID-19 pandemic rules. This study provides an
... Show MoreCryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis
Free-Space Optical (FSO) can provide high-speed communications when the effect of turbulence is not serious. However, Space-Time-Block-Code (STBC) is a good candidate to mitigate this seriousness. This paper proposes a hybrid of an Optical Code Division Multiple Access (OCDMA) and STBC in FSO communication for last mile solutions, where access to remote areas is complicated. The main weakness effecting a FSO link is the atmospheric turbulence. The feasibility of employing STBC in OCDMA is to mitigate these effects. The current work evaluates the Bit-Error-Rate (BER) performance of OCDMA operating under the scintillation effect, where this effect can be described by the gamma-gamma model. The most obvious finding to emerge from the analysis
... Show MoreSingle-photon detection concept is the most crucial factor that determines the performance of quantum key distribution (QKD) systems. In this paper, a simulator with time domain visualizers and configurable parameters using continuous time simulation approach is presented for modeling and investigating the performance of single-photon detectors operating in Gieger mode at the wavelength of 830 nm. The widely used C30921S silicon avalanche photodiode was modeled in terms of avalanche pulse, the effect of experiment conditions such as excess voltage, temperature and average photon number on the photon detection efficiency, dark count rate and afterpulse probability. This work shows a general repeatable modeling process for significant perform
... Show MoreThis paper discusses using H2 and H∞ robust control approaches for designing control systems. These approaches are applied to elementary control system designs, and their respective implementation and pros and cons are introduced. The H∞ control synthesis mainly enforces closed-loop stability, covering some physical constraints and limitations. While noise rejection and disturbance attenuation are more naturally expressed in performance optimization, which can represent the H2 control synthesis problem. The paper also applies these two methodologies to multi-plant systems to study the stability and performance of the designed controllers. Simulation results show that the H2 controller tracks a desirable cl
... Show More