Preferred Language
Articles
/
jcofarts-729
Semantic Analogy of Quran Text Content Found in Ornamental Figures in Islamic Architecture: وسام كامل عبد الامير
...Show More Authors

This study aims at creating an analogy between Quran text Contents as meanings that have representations as visional shapes within ornamental figures in Islamic architecture. The theoretical framework of the study deals with the concept of semantics and its parts, artistic contents of Quran texts, and ornamental figures in Islamic architecture. The study procedures included a population of (69) figures, (5) of them were chosen deliberately for analysis in accordance with a form that had been presented to a number of experts to ensure its validity. The study reached a number of conclusions, the most significant among them are: adopting natural denotation of direct reference in order to link the ornamental figure to the source it was taken from via depending on analogy of the realistic (source/blueprint) and the ornamental adapted (copy) as in animal and plant figures, which is pinpointed either (iconically) through the ornamental figure imitation of reality, and (indicatively) through linking cause to effect (consequence) to identify a hidden fact, and (symbolically) without relying on causality; analogy between Quran text content (meaning = an idea) and ornamental figures in Islamic architecture (the word) includes content of oneness and perfection and its representation in ornamental figures and content of order and abstractness as a view that goes beyond the obvious limits of figure to reach what lies behind that, and the content of repetition that involves repeating an event in terms of time and place in a cyclic way that imitates ornamentally prevalence, completion, and reproduction of new figures through reordering components; and the meaning underlining ornamental figures seeks to reflect an aesthetic picture of reality with a subjective vision of ornamental figures and an objective vision of the components employed in ornamenting Islamic architecture through the styles of (capturing and envisioning) which are divided into concrete: through direct capturing with a slight modification for aesthetic reasons as in trees and instinctive: through mental discerning and realization of figures order and the abstract connections within this order by (envisioning) a figure that turns what is mentally realized to an entity that has actual existence

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
Audio Classification Based on Content Features
...Show More Authors

Audio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Diversity of Morphological and Syntactic Aspects in the Holy Quran with Reference to the Verse "Have we not made the earth a receptacle"
...Show More Authors

Diversity of the aspects of analyzing a specific linguistic issue is considered to be a
familiar phenomenon in learning Arabic in which – at different levels- various linguistic
aspects and phases – sometimes – are involved in a linguistic issue . In this paper , the
problematic issues during linguistic analysis are taken into an account. The Holy Quran
interpretation books include many Quranic expressions which have a lot of meaning described
by different interpreters , from them this paper has selected only one expression ( = كفاتا
receptacle ) from the verse "Have we not made the earth a receptacle " ( Al- Mursalat verse 25
) , this paper believes that this expression is sufficient display the interpret

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 22 2018
Journal Name
Journal Of Economics And Administrative Sciences
Electronic management and its role in streamlining work procedures at the University of Imam Mohamed Bin Saud Islamic University
...Show More Authors

This study aims to identify the role of electronic management in simplifying the work procedures at Imam Muhammad bin Saud Islamic University. The study was based on the random sample of (366) individuals. The data were collected through interviews and questionnaire. The statistical tests were applied according to the data and the study hypotheses: Cronbach’s Alpha, mean, standard deviation, Z test, ANOVA. The study concluded numbers of results: Imam Muhammad bin Saud Islamic University applies electronic management in its administrative processes (planning, organizing, directing, controlling) to a very high level. There are substantial differences in the views of the sample me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Civilizations and Environmental Particulars of Place in Islamic Holy Thresholds in Iraq (Alkadhumain Holy Threshold as a case study)
...Show More Authors

Islamic shrines architecture is one of the Islamic Architectural building types. It is called (Thresholds); (Atabat) in Arabic. Thoroughbred throughout the Islamic world from the east to west. In addition, it carries the style features and peculiarities of uniqueness from the rest of the types of Islamic architecture. By virtue of the particularity of its function as tomb for important person in Islamic history. Islamic shrines architecture has grown and evolved in started from the small shrines, and then taken to widen with the evolution of time in line with the value of the event and the rituals associated with it. Some of them to became centers of large cities of the largest in many parts of the Islamic world.

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
What is the contract of cultivating the land of the waqf in Islamic jurisprudence and the Algerian Awqaf law
...Show More Authors

What is the contract of cultivating the land of the waqf in Islamic jurisprudence and the Algerian Awqaf law

View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
New vision of Mr. Abdul Mahdi Al-Muttafiqi in the light of unpublished documents
...Show More Authors

New vision of Mr. Abdul Mahdi Al-Muttafiqi in the light of unpublished documents

View Publication Preview PDF
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref