The purpose of this research is to identify heritage and highlight its value by drawing on its decorative vocabulary and integrating it with the Arabic calligraphy to revive the heritage in a contemporary style, and to create decorative design units inspired by Sadou and Arabic calligraphy and to employ them in the modern fashion designs. The applied descriptive approach has been used in this research, and the research community is made of women in Riyadh area. The tools used in this research were the questionnaire and the observation. The most important results of the research are: the design of decorative units from the integration of Arabic calligraphy and the decorations of the Saduo, and the use of these units in the design of the of women's fashion using the method of printing, and manual and automatic embroidery. The research has stressed the importance of integrating Saduo decorations with the calligraphy in raising the aesthetic value of the dress, and contributing to the revival of the heritage, and promoting the national identity through fashion. One of the most important recommendations in this research is to encourage local designers to use Arabic calligraphy, sadou decoration in fashion design, and textiles. The entities concerned with heritage events make exhibitions, and various presentations to identify heritage, especially folklore, and to increase interest in the study of Arabic calligraphy - with the artistic and aesthetic values that it has - in universities and academic programs through the inclusion of calligraphy and supporting the garment industry, and textiles inspired by Saudi traditional heritage to fit the modern era, while retaining its originality which would be helping to revive the heritage and promote the national identity of the members of society..
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show Moreالاحداث السياسية في العراق بعد 2003 وأثر الانتماء والوعي في التشكيل العراقي المعاصر
This study was conducted for evaluating the cytotoxic effect of heat stable enterotoxin a (STa) produced by enterotoxigenic Escherichia coli on the proliferation of primary cancer cell cultures, obtained from tumor samples that were collected from (13) cancer patients and as follows: (five colon cancer patients, two bladder cancer patients, two breast cancer patients, two stomach cancer patients and two lung cancer patients), and on normal cell line (rat embryonic fibroblast / REF) (in vitro) with the use of different concentrations starting from (1) mg/ml and ending with (0.0002) mg/ml by making two fold serial dilutions by using the 96- well microtiter plate, and in comparison with negative (PBS) and positive (MMC, at concentration
... Show MoreBackground: In capturing a negative image, the digital impression secures a digital record for the purposeof designing and creating restorations. The introduction of scanning system presents a paradigm shift in the way of the dental impression procedure and encourages the accuracy of obtained restoration especially in the marginal area as a result of producing accurate final impression The digital system offers many advantages over the Conventional method.. The objective of this present in vitro study was to evaluate the marginal fitness of all ceramic crowns fabricated by direct digital scanning of the prepared tooth using two types of intra-oral cameras (Bluecam camera with strip light projection technique and Omnicam camera with video sa
... Show MoreA novel metal-organic framework (MOF) sorbent based on tannic acid/copper (TA/Cu) was synthesized and characterized for the application of the anticancer drug imatinib (IMA) from biological samples. The TA/Cu MOF was prepared via a facile coordination reaction and thoroughly characterized by SEM, XRD, and FTIR techniques. Critical parameters influencing the extraction efficiency of imatinib mesylate (IMAM), including pH, ionic strength, desorption solvent, and adsorption-desorption time were optimized. With acetonitrile as the desorption solvent, the method demonstrated a broad linear range of 0.55-300 μg L-1 under ideal conditions. Limits of detection and quantification were found to be 0.16 μg L-1 and 0.55 μg L-1, respectively.
... Show MoreA novel metal-organic framework (MOF) sorbent based on tannic acid/copper (TA/Cu) was synthesized and characterized for the application of the anticancer drug imatinib (IMA) from biological samples. The TA/Cu MOF was prepared via a facile coordination reaction and thoroughly characterized by SEM, XRD, and FTIR techniques. Critical parameters influencing the extraction efficiency of imatinib mesylate (IMAM), including pH, ionic strength, desorption solvent, and adsorption-desorption time were optimized. With acetonitrile as the desorption solvent, the method demonstrated a broad linear range of 0.55-300 μg L-1 under ideal conditions. Limits of detection and quantification were found to be 0.16 μg L-1 and 0.55 μg L-1, respectively.
... Show MoreA novel metal-organic framework (MOF) sorbent based on tannic acid/copper (TA/Cu) was synthesized and characterized for the application of the anticancer drug imatinib (IMA) from biological samples. The TA/Cu MOF was prepared via a facile coordination reaction and thoroughly characterized by SEM, XRD, and FTIR techniques. Critical parameters influencing the extraction efficiency of imatinib mesylate (IMAM), including pH, ionic strength, desorption solvent, and adsorption-desorption time were optimized. With acetonitrile as the desorption solvent, the method demonstrated a broad linear range of 0.55-300 μg L-1 under ideal conditions. Limits of detection and quantification were found to be 0.16 μg L-1 and 0.55 μg L-1, respectively.
... Show MoreAfter baking the flour, azodicarbonamide, an approved food additive, can be converted into carcinogenic semicarbazide hydrochloride (SEM) and biurea in flour products. Thus, determine SEM in commercial bread products is become mandatory and need to be performed. Therefore, two accurate, precision, simple and economics colorimetric methods have been developed for the visual detection and quantitative determination of SEM in commercial flour products. The 1st method is based on the formation of a blue-coloured product with λmax at 690 nm as a result of a reaction between the SEM and potassium ferrocyanide in an acidic medium (pH 6.0). In the 2nd method, a brownish-green colored product is formed due to the reaction between the SEM and phosph
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show More