Preferred Language
Articles
/
jcofarts-340
Mural Photography Techniques: منى حيدر علي
...Show More Authors

The study aimed to study the role of technology in the production of the mural photography, and to develop its concept to the viewer, through the achievement of the aesthetic and functional vision. Through this study, some types of these techniques, which are organically related to architecture, were identified.

The mural photography includes a huge amount of techniques, and methods, and the researcher presented them through five techniques: (AlTamira, Alfresk, acrylic, mosaic, and glass art, which takes the architectural character.

The research consists of:

Methodological framework: research problem, research objectives, research limits, importance of research, and definition of terms.

Theoretical framework: The first section: techniques and mechanisms of construction in the mural art that has been distinguished through the ages.

The second section: techniques used in the mural photography.

Techniques in mural photography are multiple in implementation, where we find some of which is competent in accepted ways methods, and others related to the surface of the wall or the surface to add the mural painting for the architectural form.

The procedural framework includes: research community - samples analysis - research methodology and then the researcher reached a number of results:

The study aimed to develop the concept of the mural painting of the viewer, starting from the originality of thought and based on plastic principles and aesthetic values with high content, taking into account the element of raw materials and techniques that develop the traditional concept of mural photography art for the artist and the recipient, in addition to supporting and reviving the idea of organic link of the mural painting with architecture, on the one hand, and the interior design, on the other hand.  The mural artists benefited from the materials, techniques, environmental and social conditions surrounding them and designed different methods and treatments depending on the environment and time period and then followed by proposals and recommendations

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 29 2021
Journal Name
College Of Islamic Sciences
Reading in the thought of Imam Ali The philosophy of dialogue and the unity of the nation,
...Show More Authors

This study is taken from the doctoral thesis that I prepared in the year 2000 at the University of Bordeaux in France under the title “ Ali bin Abi Talib Imam and Calif “. This thesis was prepared as a continuation of what the French orientalism Louis Massignon wrote about Islam and his student Henry Corbin, who introduced Europeans to Shiism. This study represents the philosophy of dialogue and the unity of the Islamic Emma as one of the most important methods used by Imam Ali.

Imam Ali established the most beautiful, creative, and most complete rules of human dialogue that preserve the unity of the nation’s fabric and preserves human dignity. Imam Ali referred to basic principles foundations to reach this goals, including

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The significance of the additional verb in Al-shakshakiah sermon of Imam Ali (peace be upon him)
...Show More Authors

The contextual clues researcher guide to determine the meaning of the word is likely to several meanings, was contextual clues Dalili in determining the meanings morphological acts whipped in a sermon Alhqhqih.
And meanings are endless on the contrary language words used to express these meanings, we find that one word may be used to express more than one meaning, leading to the phenomenon of semantic possibility.
So it was inevitable that contain language text on the signs designate the reader and listener and researcher to identify the intended meaning, and these signs are contextual clues in the text.
Actual formulas whipped features from other formulas morphological Pkthertha frequent use and the large number of meanings men

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 26 2024
Journal Name
مجلة آداب المستنصرية
دلالة حروف الجر في الحكم القصار للإمام علي (عليه السلام)
...Show More Authors

حروف الجر هي حروف إضافة وروابط تدخل على الأسماء فقط ،فهي من علاماته فتعطيه حكم الجر؛ وبدخولها على الأسماء تجمع معانٍ للكلمات المتفرقة والمتناثرة في جمل متناسقة مفهومة في ذهن القارئ والمتلقي وتوصل معاني الافعال إلى الأسماء التي لا تستطيع الوصول إلى مفاعيلها، وهذا يدل على أن حروف الجر حروف عاملة وإن كان بعضها يأتي زائداً ،ولكل حرف من هذه الحروف معانٍ ودلالات قد تنفرد بها أو تشترك مع الحروف الأُخر فتضفي هذا الم

... Show More
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
Comparative Analysis of Various Multicarrier Modulation Techniques for Different Multilevel Converters
...Show More Authors

The applications of Multilevel Converter (MLC) are increased because of the huge demand for clean power; especially these types of converters are compatible with the renewable energy sources. In addition, these new types of converters have the capability of high voltage and high power operation. A Nine-level converter in three modes of implementation; Diode Clamped-MLC (DC-MLC), Capacitor Clamped-MLC (CC-MLC), and the Modular Structured-MLC (MS-MLC) are analyzed and simulated in this paper. Various types of Multicarrier Modulation Techniques (MMTs) (Level shifted (LS), and Phase shifted (PS)) are used for operating the proposed Nine level - MLCs. Matlab/Simulink environment is used for the simulation, extracting, and ana

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jul 31 2017
Journal Name
Journal Of Engineering
Assessment of Water Clarity within Dokan Lake Using Remote Sensing Techniques
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Jun 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Drilling Optimization by Using Advanced Drilling Techniques in Buzurgan Oil Field
...Show More Authors

Efficient and cost-effective drilling of directional wells necessitates the implementation of best drilling practices and advanced techniques to optimize drilling operations. Failure to adequately consider drilling risks can result in inefficient drilling operations and non-productive time (NPT). Although advanced drilling techniques may be expensive, they offer promising technical solutions for mitigating drilling risks. This paper aims to demonstrate the effectiveness of advanced drilling techniques in mitigating risks and improving drilling operations when compared to conventional drilling techniques. Specifically, the advanced drilling techniques employed in Buzurgan Oil Field, including vertical drilling with mud motor, managed pres

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Sep 04 2021
Journal Name
Neuroquantology
Nanotechnology and the Most Important Characterization Techniques for Nanomaterial's: A Review
...Show More Authors

Due to the importance of nanotechnology because of its features and applications in various fields, it has become the focus of attention of the world and researchers. In this study, the concept of nanotechnology and nanomaterials was identified, the most important methods of preparing them, as well as the preparation techniques and the most important devices used in their characterization.

View Publication Preview PDF
Crossref
Publication Date
Wed Nov 05 2025
Journal Name
Al–bahith Al–a'alami
Organizational reputation: A descriptive study of concept development and measurement techniques
...Show More Authors

The study aimed to monitor the concept of reputation in the previous literature, its relationship to mental image and identity, and to reveal recent trends in its measurement Techniques.

    The study relied on a descriptive approach using library survey and comparative analysis, and the study reached following conclusions:

     Despite the beginning of the first signs of reputation In the fifties of the last century, however, Defining and standardizing the concept with clear and specific dimensions began in the 1990s and the beginning of the third millennium. The concept of reputation refers to the stakeholders’ overall evaluation of organizations, which reflects their perceptions of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref