This research interested to study the structural configuration in the square kufi script, as the kufi script is one of the oldest Arabic fonts, and this name was named according to the city of Kufa, so its types, forms, and designations were numerous, including the square kufic script, which was characterized by being a very straightforward engineering script based on the principle of squaring in building letters to form an engineering body that governs its construction of a set of organizational relationships and design bases according to an engineering structural system. The researchers identified the problem of his research with the following question: What is the Structural configuration in the square Kufic script?
Therefore, the research interested to show the structural configuration in the kufi script, for the period from (1383 AH - 1963 AD) to (1432 AH - 2011 CE), in Iraq.
The second chapter included the theoretical framework, as the first topic dealt with the composition in the square kufic script. And as for the second topic include the structural anchors of the formation in the square kufic script, then followed by indicators of the theoretical framework and previous studies.
The third chapter included research procedures, as the descriptive analytical approach was adopted. The fourth chapter included analyzing the samples, presenting the results, conclusions
The subject of population support is one of the most important topics in the geography of the population as it shows the amount of burden on the workforce in society and reflects the balance or
معيار القصديَّة في النص هو من الدراسات الحديثة المتطورة من لسانيات الجملة الى لسانيات النص ، وتحليل الخطاب . والذي يعنى بالطرق والأدوات التي يستغلها المؤلف لتحقيق الغايات المقصديَّة
وهذا البحث ناقش مفهوم(القصديَّة) لغةً ،واصطلاحاً . فاللغة والكلام شكل من أشكال الوجود الإنساني و( الكلام) هو وسيلة التواصل بين الملقي القارئ ، والمتلقي السامع ؛ وللتوصل الى الدلالة القصديَّة الدقيقة للغة المنطوقة وا
... Show MoreThis article conclude a theoretical study for the possibility to produce additional electric power from Iraqi steam power plants by cutting – off high-pressure feed water heaters . Three separated steam power plants which Dura , south –Baghdad and Nasria were studied . The investigation showed the possibity of increasing the electric power from 10 to 15% for Dura and Nasria , whereas 6% for south – Baghdad . According to the nowadays of operation to Iraqi steam power plants , the results showed that by cutting–off high pressure feed water heaters we can generate additional electric power about 250 MW during 3-4 hrs. daily. In addition, the fuel consumption can be reduced in comparison with diesel generat
... Show MoreThis study aimed to identify the educational leadership in the light of my theory xy and its relationship to the morale of the managers of the junior high school as the study population consisted of directors of junior high school in the city of Baghdad of six directorates education for the academic year 2013-2014 AD The number of managers (211) as director, and amounted to a sample Search of (150) director and director of the research community overall rate (71%) and represent this community fully representative sample, two tools were used in the study: the first measure of educational leadership in the light of my theory xy and the second tool to gauge morale.
Results concluded that the
... Show Moreوقائع واوراق ندوة (السياسة الخارجية الامريكية في عهد اوباما) التي عقدها فرع الدراسات الدولية في 25 تشرين الثاني 2009
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show More