Preferred Language
Articles
/
jcofarts-808
Using typographic patterns in commercial advertising design: عصام إبراهيم محمد الكبيسي
...Show More Authors

Typographic patterns are one of the design elements in commercial advertising for their ability to deliver the message and information to the recipient smoothly and quickly, and it is indicated that there are many different techniques that can use typographic patterns in commercial advertisements, including spacing, spaces between letters, letter height, length, weight, and contrast and this Usage must be studied according to the type of font and how it can be used in advertising campaigns.
Based on the above, the research came to study (employing typographic patterns in commercial advertising design) in which the researcher identified his question for the purpose of reaching a solution to his research problem which is (Is it possible to employ typographic patterns to be used as a basic element in designing the advertising idea for commercial advertising to achieve functional, aesthetic and expressive values? It also included the importance of research and limitations as well as the definition of terminology.
As for the theoretical framework, the literature related to the research topic was reviewed to include the concept of typography, and the functional dimension of typographic patterns, and it was concluded with the indicators of the theoretical framework.
As for the research procedures, the researcher adopted the descriptive approach, the method of analyzing the content in the analysis procedures, in order to achieve the goal of the research, as the research community came to be represented by the products of international advertising agencies and for the large number of advertisements issued by them, the researcher decided to approve the designs issued by them and chose the designs of printed advertisements only and issued by them for the year 2018.
And the last of this research, the results and conclusions were reviewed, the most important of which are:
1. The result of the use of three-dimensional letters has the ability to attract the consumer more than the two-dimensional lettering.
2. Changing the typographic character, size, weight, color, and position changes the way the message appears and often changes the meaning.
He concluded with recommendations, proposals and sources

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Engineering
Optimal Economic Design of Diversion Structures during Construction of a Dam by Particle Swarm Optimization
...Show More Authors

Publication Date
Sun Jan 01 2012
Journal Name
Journal Of Engineering
DESIGN OF A VARIABLE GAIN NONLINEAR FUZZY CONTROLLER AND PERFORMANCE ENHANCEMENT DUE TO GAIN VARIATION
...Show More Authors

In this paper, variable gain nonlinear PD and PI fuzzy logic controllers are designed and the effect of the variable gain characteristic of these controllers is analyzed to show its contribution in enhancing the performance of the closed loop system over a conventional linear PID controller. Simulation results and time domain performance characteristics show how these fuzzy controllers outperform the conventional PID controller when used to control a nonlinear plant and a plant that has time delay.

Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Developing the Complexity and Security of the Twofish Algorithm Through a New Key Scheduling Design
...Show More Authors

     The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 12 2017
Journal Name
Al-academy
The reality of interior design of Sharjah mosques and the possibility of development - selected models
...Show More Authors

Observed mosques with the advent of Islam under the auspices of care being the houses of God Almighty, and I like parts of the ground to him, the center of radiation spiritual, intellectual and ideological in the lives of Muslims, was the most important cultural and architectural evidence built by Muslims voicing their deep faith and serenity Aqidthm.valmsadjad better reflecting the reality of communication between the person and his Lord, because he is the most important building of permanence and survival, making it imperative designed the best visual forms both externally and internally.Mosques have been characterized in the United Arab Emirates distinct characteristics in terms of building elements of construction in general, and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Research In Science And Technology
Encryption of Medical Image Based on Cascaded Design of AES Block Algorithm and Chaotic Map
...Show More Authors

Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad

... Show More
View Publication
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Space-Charge Effect on the Theoretical Design of Electron Gun Operated under Zero Magnification Condition
...Show More Authors

A computational investigation is carried out in the field of charged –particle optics with the aid of numerical analysis method using the personal computer. The work is concerned with the design of electron gun with space-charge effect. The Finite element method (FEM) used in the solution of Poison's equation for determine the axial potential distribution of the two-electrode immersion lens operated under zero magnification condition , and from the solution of the paraxial ray equation the optical properties such as the focal length , spherical and chromatic aberration coefficients are determined, also a calculation of the brightness and perveance for the lens. The electrodes geometry was determined in two and three dimensi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Influence of Design Efficiency of Water Supply Network Inside Building on its Optimum Usage: Review
...Show More Authors

The water supply network inside the building is of high importance due to direct contact with the user that must be optimally designed to meet the water needs of users.  This work aims to review previous research and scientific theories that deal with the design of water networks inside buildings, from calculating the amount of consumption and the optimal distribution of the network, as well as ways to rationalize the use of water by the consumer.  The process of pumping domestic water starts from water treatment plants to be fed to the public distribution networks, then reaching a distribution network inside the building till it is  provided to the user.  The design of the water supply network inside the building is

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Chemical Methodologies
A Novel Design for Gas Sensor of Zinc Oxide Nanostructure Prepared by Hydrothermal Annealing Technique
...Show More Authors

Scopus (10)
Scopus
Publication Date
Fri Jun 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
An update on Nanoparticle Formulation Design of Piperine to Improve its Oral bioavailability: A Review
...Show More Authors

Piperine, a crystalline alkaloid compound isolated from Piper nigrum, piper longum, and other types of piper, has had many fabulous pharmacological advantages for preventing and treating some specific diseases, such as analgesic, anti-inflammatory, hepatoprotective, antimetastatic, antithyroid, immunomodulatory, antitumor, rheumatoid arthritis, osteoarthritis, Alzheimer's, and improving the bioavailability of other drugs. However, its potential for clinical use through oral usage is hindered by water solubility and poor bioavailability. The low level of oral bioavailability is caused by low solubility in water and is photosensitive, susceptible to isomerization by UV light, which causes piperine concentration to decrease. Many different

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Science
Design and implementation of a Deep Learning-based Intelligent Electronic Lock Door Entry Control System
...Show More Authors

    The Internet of Things (IoT) technology and smart systems are playing a major role in the advanced developments in the world that take place nowadays, especially in multiple privilege systems. There are many smart systems used in daily human life to serve them and facilitate their tasks, such as alarm systems that work to prevent unwanted events or face detection and recognition systems. The main idea of this work is to capture live video using a connected Pi camera, save it, and unlock the electric strike door in several ways; either automatically by displaying a live video connected via USB webcam using a deep learning algorithm of facial recognition and OpenCV or by RFID technology, as well as by detecting abnormal entrance wit

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref