The purpose of this research is to identify heritage and highlight its value by drawing on its decorative vocabulary and integrating it with the Arabic calligraphy to revive the heritage in a contemporary style, and to create decorative design units inspired by Sadou and Arabic calligraphy and to employ them in the modern fashion designs. The applied descriptive approach has been used in this research, and the research community is made of women in Riyadh area. The tools used in this research were the questionnaire and the observation. The most important results of the research are: the design of decorative units from the integration of Arabic calligraphy and the decorations of the Saduo, and the use of these units in the design of the of women's fashion using the method of printing, and manual and automatic embroidery. The research has stressed the importance of integrating Saduo decorations with the calligraphy in raising the aesthetic value of the dress, and contributing to the revival of the heritage, and promoting the national identity through fashion. One of the most important recommendations in this research is to encourage local designers to use Arabic calligraphy, sadou decoration in fashion design, and textiles. The entities concerned with heritage events make exhibitions, and various presentations to identify heritage, especially folklore, and to increase interest in the study of Arabic calligraphy - with the artistic and aesthetic values that it has - in universities and academic programs through the inclusion of calligraphy and supporting the garment industry, and textiles inspired by Saudi traditional heritage to fit the modern era, while retaining its originality which would be helping to revive the heritage and promote the national identity of the members of society..
Although the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .
In this paper a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet
... Show MoreThe logistic regression model is an important statistical model showing the relationship between the binary variable and the explanatory variables. The large number of explanations that are usually used to illustrate the response led to the emergence of the problem of linear multiplicity between the explanatory variables that make estimating the parameters of the model not accurate.
... Show MoreThis paper highlights the main features of conjunctive adverbials and their occurrence in English academic prose. It accounts for the semantic roles of conjunctive adverbials, forms in which they are used, their positions within a sentence, and their frequency of occurrence in different registers with special reference to academic prose. It also tries to investigate possible differences in men's and women's use of conjunctive adverbials.
Keyword: conjunctive adverbials, linking adverbials, stance adverbials, circumstance adverbials, academic prose
Zygapophyseal joints (or facet joints), are a plane synovial joint which located between the articular facet processes of the vertebral arch which is freely guided movable joints. Ten dried vertebrae were used for the lumbar region and taking (L4) as a sample to reveal stress pathways across the joints by using ANSYS program under different loading conditions which used Finite Elements Analysis model. Results obtained from the ANSYS program are important in understanding the boundary conditions for load analysis and the points of stress concentration which explained from the anatomical point of view and linked to muscle and ligament attachments. This model used as a computational tool to joint biomechanics and to prosthetic im
... Show MorePraise be to Allah , and peace and blessings of God sent mercy to the worlds Muhammad
Amin and his family and his friends and followers to the Day of Judgement .
Savants Jews worked to distort the Torah calamity on the Prophet Moses ( peace be upon
him ) to achieve their goals and objectives , which are decorating sin to their followers , and
spreading corruption on earth, through the charge prophets Bmvassad , morality, as the
example and the example that emulate the human in the book of the Lord of the worlds and
their Prophet Lot, described the weak, and cheese, and lack of modesty, and disobedience ,
drinking alcohol , and his failure to raise his two daughters , Jews are corrupt in the ground .
Koran , which
Simulation of direct current (DC) discharge plasma using
COMSOL Multiphysics software were used to study the uniformity
of deposition on anode from DC discharge sputtering using ring and
disc cathodes, then applied it experimentally to make comparison
between film thickness distribution with simulation results. Both
simulation and experimental results shows that the deposition using
copper ring cathode is more uniformity than disc cathode
The purpose of this study is to evaluate the hydraulic performance and efficiency of using direction diverting blocks, DDBs, fixed on the surface on an Ogee spillway in reducing the acceleration and dissipating the energy of the incoming supercritical flow. Fifteen types of DDB models were made from wood with a triangulate shape and different sizes were used. Investigation tests on pressure distribution at the DDBs boundaries were curried out to insure there is no negative pressures is developed that cause cavitation. In these tests, thirty six test runs were accomplished by using six types of blocks with the same size but differ in apex angle. Results of these test showed no negative pressures developed at the boundarie
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8