Preferred Language
Articles
/
jcofarts-671
The formal variations of the Quran calligraphy at the beginning of Islam: كفاح جمعة حافظ
...Show More Authors

The present research deals with studying the formal variations for the Quranic calligraphy at the beginning of Islam , as being regarded from the original Arabic calligraphies which were developed later till they became as they are now, where the calligraphers in pushing for simulating these original calligraphies and knowing the methods of their writing by the calligraphers at that time.That helped in enriching and developing the aesthetic and designing valuesFor these calligraphies, as being calligraphic achievements represent transmission resulted from the objective, aesthetic and indicative vision in producing the verses according to a certain form. This has a clear impact in tendency to the technical, aesthetic and expressing development in producing designing structures unlimited with certain letters or a general building for the page.Through the surveying study, research and models which where obtained , the researcher was able to give the problems of his research the following question :What are the formal variations for the quranis calligraphy at the beginning of Islam?The importance of the research embodied through the interest with the calligraphies which were about to vanish because of the rarity of using them. The formal variations are being clarified by showing the forms of the letters of these calligraphies and the advantage which is being presented by the study for the researchers and scholars in the domain of knowing these calligraphies. This study aimed at discovering the formal variations for the quranic calligraphy at the beginning of Islam through determining the formal variations for the letters, the general building of the page and the method in which they have been written in limits of calligraphic models which arrived to us, in the calligraphy which is called madani and makain during the first hundreds years from the beginning of Islam. The second chapter deals with the theoretical frame which contained the writing of Quran in the era of messenger (peace to upon him) , and the materials which the Qurans were written on at the beginning of Islam . The third chapter contained the procedure of the research. The fourth chapter deals with analyzing the samples and showing the results, conclusions recommendations and proposals.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 27 2021
Journal Name
Journal Of Engineering
Physical Simulation for the Flow in Straight and Rectangular Loop Manifolds
...Show More Authors

The flow in a manifolds considered as an advanced problem in hydraulic engineering applications. The objectives of this study are to determine; the uniformity qn/q1 (ratio of the discharge at last outlet, qn to the discharge at first outlet, q1) and total head losses of the flow along straight and rectangular loop manifolds with different flow conditions. The straight pipes were with 18 m and 19 m long and with of 25.4 mm (1.0 in) in diameter each. While, the rectangular close loop configuration was with length of 19 m and with diameter of 25.4 mm (1.0 in) also. Constant head in the supply tank was used and the head is 2.10 m. It is found that outlets spacing and manifold configuration are the main factors aff

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Sep 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Analytical Model for Detection the Tilt in Originally Oil Water Contacts
...Show More Authors

Many carbonate reservoirs in the world show a tilted in originally oil-water contact (OOWC) which requires a special consideration in the selection of the capillary pressure curves and an understanding of reservoir fluids distribution while initializing the reservoir simulation models.
An analytical model for predicting the capillary pressure across the interface that separates two immiscible fluids was derived from reservoir pressure transient analysis. The model reflected the entire interaction between the reservoir-aquifer fluids and rock properties measured under downhole reservoir conditions.
This model retained the natural coupling of oil reservoirs with the aquifer zone and treated them as an explicit-region composite system

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
Developing a Proposed System to Organize the Investment Opportunities in Iraq
...Show More Authors

......

The Iraqi government seeks to overcome the financial crisis by investing and privatizing some projects to achieve sustainable growth. Most of the investment projects in Iraq suffer from many constraints that greatly impact the success of these projects. A survey of the opinions of a group of experts was conducted to identify the most important constraints facing the investment process in Iraq. Then the experts' answers were arranged in a closed questionnaire and distributed to the research sample for which the statistical analysis was conducted. Through it, the most important (17) factors that had the greatest impact on the failure of investment projects in Iraq were reached. One of the main constraints was

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 28 2020
Journal Name
Journal Of Law And Humanities Sciences
Fair compensation for expropriation for the public benefit (A comparative study)
...Show More Authors

The right to property is one of the most fundamental rights enjoyed by individuals, and most national constitutions and laws, as well as international conventions, have to be respected and protected only in accordance with the economic and social development of the country (the so-called public benefit) and in return for just compensation. What is fair compensation?

Publication Date
Thu May 01 2025
Journal Name
Iraqi Journal Of Humanitarian, Social And Scientific Research
Portuguese Colonial Policy in Brazil in the Sixteenth and Seventeenth Centuries
...Show More Authors

Over the course of two centuries, Portugal emerged as one of the most powerful European empires, with colonies stretching from Asia and Africa to Brazil. A significant factor in this expansion was the role of winds, which carried one of Cabral’s ships westward, landing unexpectedly on unknown shores—the Brazilian coasts. These territories later became some of Portugal’s richest and most important colonies. Therefore, the study begins in the 16th century and concludes at the end of the 17th century. The study was divided into four sections. The first section addressed Portugal's discovery 0022 of Brazil and its naming before it gained economic importance. The second section discussed the Portuguese occupation of Brazil in 1530 and its

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 11 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
Three-species food chain model with cannibalism in the second level
...Show More Authors

This article suggests and explores a three-species food chain model that includes fear effects, refuges depending on predators, and cannibalism at the second level. The Holling type II functional response determines food consumption between stages of the food chain. This study examined the long-term behavior and impacts of the suggested model's essential elements. The model's solution properties were studied. The existence and stability of every probable equilibrium point were examined. The persistence needs of the system have been determined. It was discovered what conditions could lead to local bifurcation at equilibrium points. Appropriate Lyapunov functions are utilized to investigate the overall dynamics of the system. To support the a

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Theoretical And Applied Information Technology
A Survey on the Vein Biometric Recognition Systems: Trends and Challenges
...Show More Authors

Vascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed

... Show More
Publication Date
Thu Apr 08 2021
Journal Name
Journal Of Interdisciplinary Mathematics
The F-composition operator on Hardy space ℍ<sup>2</sup>
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Apr 11 2021
Journal Name
Environment, Development And Sustainability
Developing a system for assessing the sustainability in school building projects
...Show More Authors

View Publication
Crossref (9)
Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (12)
Scopus Crossref