The purpose of this research is to identify heritage and highlight its value by drawing on its decorative vocabulary and integrating it with the Arabic calligraphy to revive the heritage in a contemporary style, and to create decorative design units inspired by Sadou and Arabic calligraphy and to employ them in the modern fashion designs. The applied descriptive approach has been used in this research, and the research community is made of women in Riyadh area. The tools used in this research were the questionnaire and the observation. The most important results of the research are: the design of decorative units from the integration of Arabic calligraphy and the decorations of the Saduo, and the use of these units in the design of the of women's fashion using the method of printing, and manual and automatic embroidery. The research has stressed the importance of integrating Saduo decorations with the calligraphy in raising the aesthetic value of the dress, and contributing to the revival of the heritage, and promoting the national identity through fashion. One of the most important recommendations in this research is to encourage local designers to use Arabic calligraphy, sadou decoration in fashion design, and textiles. The entities concerned with heritage events make exhibitions, and various presentations to identify heritage, especially folklore, and to increase interest in the study of Arabic calligraphy - with the artistic and aesthetic values that it has - in universities and academic programs through the inclusion of calligraphy and supporting the garment industry, and textiles inspired by Saudi traditional heritage to fit the modern era, while retaining its originality which would be helping to revive the heritage and promote the national identity of the members of society..
The study aims at evaluating the penalty of semi- intentional killing felony in the Egyptian and Algerian criminal law following the Islamic Law (Shari'a). The study used the descriptive, evalutive and analytical methodology to reach the topic in question. To meet the theoretical significance of the study, much data has been collected to give a comprehensive picture about the topic under examination. As for the practical significance of the study, it helps the juridical power to reconsider and phrase the legal materials of the semi-intentional killing penalty based on the Islamic law. The study has come to the conclusions that the Islamic Law (Shari'a) imposes a compensation (blood-money) to be g
... Show MorePorcelain is one of the most important ceramic materials with a wide range of traditional and technical applications. Since most mixtures of porcelain have a high sintering temperature, bentonite has been added in this research to improve the characteristics of sintering and burning. The porcelain mixture consisted of the following Iraqi raw materials: 30% wt kaolin, 30 wt% non-plastic clay (grog), 10% wt sodium feldspar, 10 wt% potassium feldspar and 20 wt% flint. After the mechanical mixing process and transfer the powder mixture to the slurry by adding distilled water, then different weight percentage of the sodium bentonite(0, 2.5, 5, 7.5 and 10) wt% was added. The specimens were prepared by using the solid casting m
... Show MoreThe problem of the search (how to employ own aesthetic values sculpture prominent decorations doors in the holy shrines) as research aims to detect these formulas employed in relief sculpture in accordance with the aesthetic values of the decorations that add structure in the form of doors shrines dimensions of functional and aesthetic and expressive By selecting the general system configurations spaces for doors and select the components of the structural configurations decorative prominent types (geometric and floral and linear and composite) as well as identify the techniques adopted in the executive configurations doors at the level of raw materials and processors show. Find and define the beauty of decorative formations prominent of
... Show MoreThe sustainable competitive advantage for organizations is one of the requirements for value creation, which centered on the possession of scarce resources that achieve maximum flows to invest in intellectual capital, if what has been interest in them, measured and employed the way properly and style, so I figured the need for new technologies to enable organizations to measure the intellectual and physical assets and to assess its performance accordingly, so it sheds search light on the measurement of the added value of existing knowledge using the standard value-added factor is the intellectual (value added intellectual coefficient) (VAIC) and to develop a set of assumptions about the extent of the difference between the sample
... Show Moreفي هذا العصر - الذي داهمت في الأخطار لغة الفصاحة والبيان - يبقى القرآن الكريم أعظم حافظ للغة السليمة ، وأكبر معين لأهلها للحفاظ على ثرائها وبلاغتها ، فهي باقية ببقائه ما بقي الليل والنهار .
وهذا البحث يدور حول حفظ القرآن الكريم وأثره على لغة الطفل، ويتكون من مقدمة : وفيها بيان أهمية الموضوع ، وخطة البحث ، ومنهجه، وثلاثة مباحث:
المبحث الأول : فضل حفظ القرآن الكريم ، وفوائد حفظه إجمالاً ، والمبحث الثاني :
... Show MoreFacial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThe statistical distributions study aimed to obtain on best descriptions of variable sets phenomena, which each of them got one behavior of that distributions . The estimation operations study for that distributions considered of important things which could n't canceled in variable behavior study, as result this research came as trial for reaching to best method for information distribution estimation which is generalized linear failure rate distribution, throughout studying the theoretical sides by depending on statistical posteriori methods like greatest ability, minimum squares method and Mixing method (suggested method).
The research
... Show MoreResearchers used different methods such as image processing and machine learning techniques in addition to medical instruments such as Placido disc, Keratoscopy, Pentacam;to help diagnosing variety of diseases that affect the eye. Our paper aims to detect one of these diseases that affect the cornea, which is Keratoconus. This is done by using image processing techniques and pattern classification methods. Pentacam is the device that is used to detect the cornea’s health; it provides four maps that can distinguish the changes on the surface of the cornea which can be used for Keratoconus detection. In this study, sixteen features were extracted from the four refractive maps along with five readings from the Pentacam software. The
... Show More