The importance of this topic may not be overlooked by many of the specialists, because it is one the sciences of the Arabic language, but it is an important method in the field of influencing the recipient and his aesthetic ability to create influential images as well.
The talking about Semantic (Badi'iyah)is as old as the Arabic age, so it may be talking about it not the new thing because the people who specialized have preceded us and exhausted all the talk .
The demand for electronic -passport photo ( frontal facial) images has grown rapidly. It now extends to Electronic Government (E-Gov) applications such as social benefits driver's license, e-passport, and e-visa . With the COVID 19 (coronavirus disease ), facial (formal) images are becoming more widely used and spreading quickly, and are being used to verify an individual's identity, but unfortunately that comes with insignificant details of constant background which leads to huge byte consumption that affects storage space and transmission, where the optimal solution that aims to curtail data size using compression techniques that based on exploiting image redundancy(s) efficiently.
Let n be a positive integer and denotes the number of overpartition triples. In this note, we prove two identities modulo 16 and 32 for . We provide a new method to reprove a result of Lin Wang for completely determining and modulo 16. Also, we find and prove an infinite family of congruences modulo 32 for . The new method relies on expanding the fourth power of the overpartition infinite product together with the help of Gauss' identity.
This study aims at investigating the partial Islamic rules of preparing and distributing cartoons in order to issue an overall Islamic rul. To reach an end, descriptive and analytical approaches are adopted to clarify the nature of cartoons and other related concepts. The researcher, as well, with reference to verses of the Holy Quran, tradition (Hadith) and Islamic jurists, adopts a deductive approach to issue Islamic rules related to the industry of cartoons and it's distribution
The study consists of three sections. The first Section addresses the following issues: Definition animation; and related wordy. The second Section: Origin of Cartoon's history and it's negative and positive effects. The third Section: Islamic rules related
In this work we present the concepts of topological Γ-ring, norm of topological Γ-ring, homomorphism, kernel of topological Γ-ring and compact topological Γ-ring
During the course of fixed orthodontic therapy, patients should be instructed to eat specific food stuffs and beverages in order to maintain good health for the dentition and supporting structures and prevent frequent attachment debonding that prolong the treatment duration. After searching and collecting articles from 1930 till July 2021, the current review was prepared to emphasize various types of foods that should be taken during the course of fixed orthodontic therapy and to explain the effect of various food stuffs and beverages on the growth and development of craniofacial structures, tooth surfaces, root resorption, tooth movement, retention and stability after orthodontic treatment and the effect on the components of fixed ortho
... Show MoreObjectives: Although the Frankfort Horizontal (FH) and sella-nasion were routinely used as craniofacial reference planes, the inter-individual orientations were changeable when related to true horizontal (HOR). Natural head position (NHP) is a reproducible, standardized position, with the head in an upright posture and eyes focused on a point in the distance at eye level so that the visual axis is horizontal. The natural head position has importance in anthropological as well as in orthodontic fields, as this position has a relatively fixed relationship to the true horizontal and vertical planes. However, NHP is clinically not simple and it takes long time to be recorded, in addition to a deficiency in the tools utilized in the NHP and l
... Show MoreSteganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography
In this review paper, several research studies were surveyed to assist future researchers to identify available techniques in the field of infectious disease modeling across complex networks. Infectious disease modelling is becoming increasingly important because of the microbes and viruses that threaten people’s lives and societies in all respects. It has long been a focus of research in many domains, including mathematical biology, physics, computer science, engineering, economics, and the social sciences, to properly represent and analyze spreading processes. This survey first presents a brief overview of previous literature and some graphs and equations to clarify the modeling in complex networks, the detection of soc
... Show MoreIn this review paper, several research studies were surveyed to assist future researchers to identify available techniques in the field of infectious disease modeling across complex networks. Infectious disease modelling is becoming increasingly important because of the microbes and viruses that threaten people’s lives and societies in all respects. It has long been a focus of research in many domains, including mathematical biology, physics, computer science, engineering, economics, and the social sciences, to properly represent and analyze spreading processes. This survey first presents a brief overview of previous literature and some graphs and equations to clarify the modeling in complex networks, the detection of soc
... Show More