Preferred Language
Articles
/
jcofarts-1011
Visual stimulus in the design of interior spaces
...Show More Authors

The visual stimulus is the effective force in visual attraction that achieves visual and perceptual co-optation and is important in wooing the recipient, and many procedural processes in the design are interpreted on it as the visual stimulus achieves visual comfort and a sense of pleasure and gives (place) the interior space a transformation in its plastic structure as well as arousing attention through The kinetic rhythm and the formal diversity, which increases the possibility of breaking the routine and traditional constraints of design patterns through the coating and encapsulation of the vertical and horizontal levels . Thus, the research problem was launched based on the following question: What are the stimuli of the visual stimulus in the designs of the internal space of the communications company (Zain Iraq)? In order to achieve the goal of the current research represented by revealing the visual stimulus in the designs of the internal space of the telecom company Zain Iraq. In order to cover the contents of the research and its variables, the research structure is distributed into three chapters. The first set out to clarify the introductory framework for the research, while the second reviewed the theoretical framework and the reality of two chapters, namely:
1. The visual stimulus as a concept in interior design.
2. The relationship of the visual stimulus in the design of the interior space.
The third chapter deals with the research procedures, results and conclusions, including

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 17 2019
Journal Name
Journal Of Interdisciplinary Mathematics
Soft 𝒦(<i>sc</i>)-spaces
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Cech Fuzzy Soft Bi-Closure Spaces
...Show More Authors
Abstract<p>In the present study, Čech fuzzy soft bi-closure spaces (Čfs bi-csp’s) are defined. The basic properties of Čfs bi-csp’s are studied such as we show from each Čfs bi-csp’s (<italic>u, L<sub>1</sub>, L<sub>2</sub>, S</italic>) we can obtain two types of associative fuzzy soft topological spaces, the first is a fuzzy soft bitopological space (<italic>U, τ<sub>L<sub>1</sub> </sub>, τ<sub>L<sub>2</sub> </sub>, S</italic>) and the second is a fuzzy soft topological space (<italic>U, τ<sub>L<sub>1</sub> </sub> </italic></p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Lecture Notes In Networks And Systems
Fibrewise Maximal and Minimal Topological Spaces
...Show More Authors

Abstract. This study gives a comprehensive analysis of the properties and interactions of fibrewise maximal and minimal topological spaces. Fibrewise topology extends classical topological concepts to structured spaces, providing a thorough understanding of spaces that vary across different dimensions. We study the basic theories, crucial properties, and characterizations of maximal and minimal fibrewise topological spaces. We investigate their role in different mathematical contexts and draw connections with related topological concepts. By providing exact mathematical formulations and comprehensive examples, this abstract advances the fields of topology and mathematical analysis by elucidating the unique properties and implications of fib

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Technological Change in Process Design Decisions (Applied study in an organization)
...Show More Authors

Abstract:

     Due to the importance of technology and the accompanying changes of the environment affecting companies that use the technology mainly in their work, especially as most companies live in an unstable dynamic environment, which motivated the researchers to choose the International Company for smart card (Keycard) as a field of research and find ways to them to face Those changes.

     The problem of the study was "limited attention to the components of technological change", which included research and development, innovation and information technology, which had an impact on the design decisions of the process (process selection, cust

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 23 2020
Journal Name
Baghdad Science Journal
Compact MIMO Slots Antenna Design with Different Bands and High Isolation for 5G Smartphone Applications
...Show More Authors

 In this paper, two elements of the multi-input multi-output (MIMO) antenna had been used to study the five (3.1-3.55GHz and 3.7-4.2GHz), (3.4-4.7 GHz), (3.4-3.8GHz) and (3.6-4.2GHz) 5G bands of smartphone applications that is to be introduced to the respective US, Korea, (Europe and China) and Japan markets. With a proposed dimension of 26 × 46 × 0.8 mm3, the medium-structured and small-sized MIMO antenna was not only found to have demonstrated a high degree of isolation and efficiency, it had also exhibited a lower level of envelope correlation coefficient and return loss, which are well-suited for the 5G bands application. From the fabrication of an inexpensive FR4 substrate with a 0.8 mm thickness level, a loss tang

... Show More
View Publication Preview PDF
Scopus (10)
Scopus Clarivate Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
The Relations Of Design And The Role Of It Making The Idea For Fashion Design
...Show More Authors

Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 15 2021
Journal Name
Al-academy
Semiotics of Visual Composition in Iraqi Contemporary Theatrical Show: اسيل ليث احمد-عبد الرحمن داخل احمد
...Show More Authors

The theatrical field has witnessed a huge development that included the semantic and formal sides, considering that the theatrical experience has gone through a long period of description and the dominance of literature and linguistics, thus the theatrical experience has been open to many workings and uses of high quality in forming and composing the visual system. The semiotics had a role in presenting transformed sign forms and features generated in the theatrical space. Thus (costumes, décor, makeup, lighting, and actor) are considered elements with sign forms and attributes that together constitute integrated semiotic unit that include all the layouts in the scenographic space. The two researchers determined on semiotics due to its

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of importance in the Intellectual Capital On Internal control Systems Analytical Research in A sample of general inspectors’ offices in Iraq
...Show More Authors

The research aims to know the influence of the intellectual capital on the internal control system in a sample of General Inspection Offices in Iraq. The research includes a sample of individuals who are working in these offices total sample (46) individuals distributed according to functional levels (General Inspector, Deputy Inspector General, and Director) , The data and information were collected by using questionnaire, which is done for this purpose, as well as personal interviews in order to reach to the results that achieve the aim of this research , Two hypotheses were formed , the first hypothesis consists of (4) secondary hypothesis , All these hypotheses were tested by using statistical tools such as (percentages, freq

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Journal Of The College Of Education For Women
A Cognitive Linguistic Study of Visual Language as a Reflection of Culture: Violence Against Women in Iraq
...Show More Authors

The present work is qualitative descriptive. It aims to examine the idiosyncratic schema when deciphering the selected violence-based panel from Nasser Ibrahim’s caricatures. The researchers accordingly adopted part of Sharifian’s (2011) Cultural Schema model, particularly that part that is concerned with the examining the micro/idiosyncratic level of understanding. The study has revealed that the participants have not only differed among themselves regarding the way a figure is being denotatively conceptualized, they also highlighted different exact conceptualizations for the same figure, such as: using various adjectives that reflect various levels of intensity, emphasizing the behavioral aspect or the appearance of the figure, ado

... Show More
View Publication Preview PDF
Crossref