Arabic calligraphy is one of the greatest achievements of Islamic art. The visual form of Arabic calligraphy is the primary means of presenting ideas and messages for expressive communication in Arabic typefaces. Emerging computer technology with calligraphy is essential for effective visual designs; however, traditional typefaces are insufficient in number and quality to fulfill the requirements of the current Saudi industry. Thus, this research investigates the processes followed by graphic designers to create modern Arabic type designs inspired by Arabic calligraphy, and presents the characteristics of Arabic calligraphy. The research implemented a mixed experimental and descriptive method, exploring 10 typefaces designed by professional graphic designers; 1) Hudhud font; 2) Thuraya font; 3) Greta Arabic font; 4) Fedra Arabic font; 5) Mishmish font; 6) Muzakhraf font; 7) Arabic@Cooper; 8) Arabic Handwritten; 9) Jude font; 10) Arabic Didot. The font analysis includes the criteria: 1) details about the designer; 2) the font inspiration; 3) the font style; and 4) uses. As a result, the research presents a set of guidelines for the designers to develop modern Arabic type designs inspired by Arabic calligraphy.
The security environment for Northeast Asia is extremely important, as it includes most of the international actors (United States of America, China, Russian Federation and Japan), which gives the nature of the interactions of these forces a special importance for the region.
Because of the multiplicity of policies and interests of the active forces in the region, the result has been an unstable regional environment where the interests of the major powers often clash repeatedly on many related issues, which is coupled with the growing efforts of many powers to adopt policies that differ from what they did in the past This resulted in different patterns of relations, which were mainly characterized by competition over regional lea
... Show MoreThe following research has been dealing ( Undermining Humanism in Foucault's thought and its implications in the pop art. meanings and facts which become in the process of the post-modernist.So the research's problem is to ask for undermining Humanism in Foucault's thought and how it formed through the formality of processors and the technical and stylistic and contents in pop art.. How are these technical aspects interact with each other to undermine the humanism in Foucault's mind and with system humanity, intellectual and social relations in the post-modern society . The contents of the first chapter, is the aim of the research, which aims to undermine know humanism in Foucault's mind and its implications in pop art , within the limit
... Show MoreLet G be a finite group, the result is the involution graph of G, which is an undirected simple graph denoted by the group G as the vertex set and x, y ∈ G adjacent if xy and (xy)2 = 1. In this article, we investigate certain properties of G, the Leech lattice groups HS and McL. The study involves calculating the diameter, the radius, and the girth of ΓGRI.
The rapid and enormous growth of the Internet of Things, as well as its widespread adoption, has resulted in the production of massive quantities of data that must be processed and sent to the cloud, but the delay in processing the data and the time it takes to send it to the cloud has resulted in the emergence of fog, a new generation of cloud in which the fog serves as an extension of cloud services at the edge of the network, reducing latency and traffic. The distribution of computational resources to minimize makespan and running costs is one of the disadvantages of fog computing. This paper provides a new approach for improving the task scheduling problem in a Cloud-Fog environme
In this work, a magnetic switch was prepared using two typesof ferrofluid materials, the pure ferrofluid and ferrofluid doped with copper nanoparticles (10 nm). The critical magnetic field (Hc) and the state of magnetic saturation (Hs) were studied using three types of laser sources. The main parameters of the magnetic switch measured using pure ferrofluid and He-Ne Laser source were Hc(0.5 mv, 0.4 G), Hs (8.5 mv, 3 G). For the ferrofluid doped with copper nanoparticles were Hc (1 mv, 4 G), Hs (15 mv, 9.6 G), Using green semiconductor laser for the Pure ferrofluid were Hc (0.5 mv, 0.3 G) Hs (15 mv, 2.9 G). While the ferrofluid doped with copper nanoparticles were Hc (0.5 mv, 1 G), Hs (12 mv, 2.8 G) and by using the violet semiconductor l
... Show MoreTHE ACTUAL SOCIETY MODEL
Our society model has been showing signs of exhaustion since the end of the XX century. The recent appearance of the Covid-19 virus is another consequence of humanity's distance from Nature and the environment it inhabits. Also, climate change, environmental deterioration, loss of biodiversity, overexploitation of natural resources, and social inequality are some of the consequences derived from this separation between society and Nature. We must change our operating habits. Inevitably from a society based on the market, hyper consumption, fossil energy and individual enrichment at all costs, we will have to change to another
... Show MoreAs an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based
... Show MoreThe unconventional techniques called “the quick look techniques”, have been developed to present well log data calculations, so that they may be scanned easily to identify the zones that warrant a more detailed analysis, these techniques have been generated by service companies at the well site which are among the useful, they provide the elements of information needed for making decisions quickly when time is of essence. The techniques used in this paper are:
- Apparent resistivity Rwa
- Rxo /Rt
The above two methods had been used to evaluate Nasiriyah oil field formations (well-NS-3) to discover the hydrocarbon bearing formations. A compu
... Show MoreDecision-making in Operations Research is the main point in various studies in our real-life applications. However, these different studies focus on this topic. One drawback some of their studies are restricted and have not addressed the nature of values in terms of imprecise data (ID). This paper thus deals with two contributions. First, decreasing the total costs by classifying subsets of costs. Second, improving the optimality solution by the Hungarian assignment approach. This newly proposed method is called fuzzy sub-Triangular form (FS-TF) under ID. The results obtained are exquisite as compared with previous methods including, robust ranking technique, arithmetic operations, magnitude ranking method and centroid ranking method. This
... Show More