Arabic calligraphy has a special status as one of the most important oriental arts, which has been enhanced by the Islamic value. The Arabic fonts have been diverse in their classification into soft lines such as Diwani, thuluth and patch lines and others, and geometrical lines such as Kufic lines and their various types. The contemporary artist was also able to adapt the Arabic calligraphy of all kinds in the construction of the painting or line formations, especially after the development of the artistic digital techniques and computer software. Here comes the role of the industrial designer as being more in touch with the practical, technical and productive life, which requires great care in adapting the line formations of the Arabic letters in the contemporary industrial production design. Throughout what has been mentioned, the present research highlights those attempts and experiments made by the industrial designer in his dealings with the Arabic line formations. The research consists of the methodological framework where the researcher identified the problem of research in asking the following question: Does the Arabic line design have a function reflected in the contemporary industrial product? The objective of the research was to identify the effectiveness of employing Arabic calligraphy formulations and their implications in the design of industrial products. The limits of research were the industrial products, which include the Arabic line formations produced between the years 2017 and 2018. The theoretical framework divided the chapter into two sections. The first is to study the aesthetics of the Arabic calligraphy formation in the design of the industrial product, while the second section included the study of the problems of Arabic calligraphy in the employment of the industrial product. The most important theoretical framework indicators have been listed in addition to the research procedures, the analysis of the models, which were (3) intentionally selected models, as well as the most important results, including:The heritage and historical presence in the inspiration of the heritage vocabulary, especially the letter formations of soft Arabic lines, which cannot be easily controlled and adapted because they are governed by strict rules as they represent Islamic and Arab specificity as part of the Arab-Islamic heritage
This research aims at studying the websites of Iraqi ministries to determine the extent of the use of electronic communication in the practice of public relations' activities through these sites, which represent a formal means of communication between the ministry and its people.
The research consists of three chapters: chapter one studies the methodological framework of the research; chapter two includes three units: unit one studies technologies of electronic communication including its concept, features and types; unit two studies electronic publications i.e. its concept and features; and unit three deals with designing the electronic websites .it ends with chapter three which is divided into two sections: section one studies the
This study aimed to explore self and public stigma towards mental illness and associated factors among university students from 11 Arabic‐speaking countries. This cross‐sectional study included 4241 university students recruited from Oman, Saudi Arabia, the United Arab Emirates (UAE), Syria, Sudan, Bahrain, Iraq, Jordan, Lebanon, Palestine and Egypt. The participants completed three self‐administrative online questionnaires—Demographic Proforma (age, gender, family income, etc.), Peer Mental Health Stigmatization Scale and Mental Health Knowledge Questionnaire. There was a significant difference in the average mean between the 11 countries (
In order to promote sustainable steel-concrete composite structures, special shear connectors that can facilitate deconstruction are needed. A lockbolt demountable shear connector (LB-DSC), including a grout-filled steel tube embedded in the concrete slab and fastened to a geometrically compatible partial-thread bolt, which is bolted on the steel section's top flange of a composite beam, was proposed. The main drawback of previous similar demountable bolts is the sudden slip of the bolt inside its hole. This bolt has a locked conical seat lug that is secured inside a predrilled compatible counter-sunk hole in the steel section's flange to provide a non-slip bolt-flange connection. Deconstruction is achieved by demounting the tube from the t
... Show MoreLaser is a powerful device that has a wide range of applications in fields ranging from materials science and manufacturing to medicine and fibre optic communications. One remarkable
Essential approaches involving photons are among the most common uses of parallel optical computation due to their recent invention, ease of production, and low cost. As a result, most researchers have concentrated their efforts on it. The Basic Arithmetic Unit BAU is built using a three-step approach that uses optical gates with three states to configure the circuitry for addition, subtraction, and multiplication. This is a new optical computing method based on the usage of a radix of (2): a binary number with a signed-digit (BSD) system that includes the numbers -1, 0, and 1. Light with horizontal polarization (LHP) (↔), light with no intensity (LNI) (⥀), and light with vertical polarization (LVP) (↨) is represen
... Show MoreThe speech recognition system has been widely used by many researchers using different
methods to fulfill a fast and accurate system. Speech signal recognition is a typical
classification problem, which generally includes two main parts: feature extraction and
classification. In this paper, a new approach to achieve speech recognition task is proposed by
using transformation techniques for feature extraction methods; namely, slantlet transform
(SLT), discrete wavelet transforms (DWT) type Daubechies Db1 and Db4. Furthermore, a
modified artificial neural network (ANN) with dynamic time warping (DTW) algorithm is
developed to train a speech recognition system to be used for classification and recognition
purposes. T
As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreResearch Summary
... Show More