Each Arab Islamic city is distinguished by its distinctive characteristics dictated by the nature of its location and its characteristics, as we see it mountainous in the mountains, deserts in the deserts, and coastal in the coasts, and this is reflected in the models of its buildings and designs and even in its structure. However, this uniqueness did not stand in the way of the emergence of characteristics and common characteristics of these cities over time, the factors derived from the core of the life of the community habits and traditions and beliefs and living requirements and environmental conditions that all piled in the process of building and construction of the Arab Islamic city to draw The features and lines of life of the community on the architecture and vocabulary and then give them their own language and distinctive. The Arab city is a living being that is influenced and influenced, takes and gives a living to the year of life, which has different ages and circumstances. This trend helps us a lot in revealing the authenticity of this city or the value of its value, which formed its physical container in the perfect harmony crystallized in the end the image of the city, the mosque, the arena, the field, the market and the inner courtyard are the original features of the Arab Islamic city, The large expansions witnessed in most Islamic cities have affected these features and overlapped the uses of the land in different styles from the traditional style, especially the urban urban style. This effect has lost the city's uniqueness due to factors such as technical, economic and other social and environmental factors in determining these patterns Over time periods of expansion and growth of the Arab Islamic city, which requires efforts to re-understand more of the nature of what should be the planning of this city in their ability to interact neighborhood associated with air conditioning with the requirements of the age in the framework of privacy required
The artistic process operates whether in general in all arts or specifically in one type of arts or one of the genres of arts types on the preoccupations of the pressing artistic references as the founder of the artistic work in the material formulations on the one hand and on the other hand as a translator to understand the artistic achievement in general and plastic art in particular and for the importance The researcher chose the title of her research tagged (the preoccupations of the pressing reference and its impact on the formations of postmodern arts).
The first chapter of the methodological framework deals with the problem of research, importance, objective, limits, and then terminology and its definition, and then the secon
God, may He be glorified and exalted be He, has given every human being the right to life and a dignified life, and has warned against transgression against any of its sanctities without a legitimate right. No one, regardless of his status or authority, can deprive a person of his rights that the Sharia came to preserve, and whoever does that has declared all people to war, as all humanity is in solidarity. In raising the hand that is simplified to harm a person and oppress him unjustly and exalted in the land.
If this is the case, the Sharia came to establish the right of people, groups and individuals, to defend their sanctities, preserve their security, recover their usurped rights, repel the aggression of the aggressors, and oppre
المواقف افي الدول العربية قراءة تحليلية في مواقف لدولية من التغيير (الولايات المتحدة - الاتحاد الاوروبي - روسيا)
As smartphones incorporate location data, there is a growing concern about location privacy as smartphone technologies advance. Using a remote server, the mobile applications are able to capture the current location coordinates at any time and store them. The client awards authorization to an outsider. The outsider can gain admittance to area information on the worker by JSON Web Token (JWT). Protection is giving cover to clients, access control, and secure information stockpiling. Encryption guarantees the security of the location area on the remote server using the Rivest Shamir Adleman (RSA) algorithm. This paper introduced two utilizations of cell phones (tokens, and location). The principal application can give area inf
... Show MoreThe present search addressed the " leadership skills and their impact on strategic planning " Where has the objective of leadership skills and strategic planning of increasing importance at the present time , for being fairly modern topics ,which have a tremendous impact on the success of organizations.. &n
... Show MoreThe Water Quality Index (WQI) is an important parameter in describing the water resources' suitability for human uses and is one of the most effective methods of describing water quality and indicative of assessing water quality and suitability for human utilization and the health of ecosystems. WQI of the Canadian Council of Ministers of the Environment (CCME) was used in the study to describe the Shatt al-Arab water quality in Basrah Southern Iraq, and its suitability for drinking use. The data for analyzing river water samples were adopted from five stations along the river every month during the years from 2014 to 2018 by the Iraqi Ministry of Environment, as it included the measurement of acidity function PH, Dissolved Oxyg
... Show MoreBasically, media studies focused on the important role of the blogs in boosting the democratic process in the Arab States. Blogs also worked on creating an alternative media for the public that maintained freedom of expression. However, media studies ignored the status of the blogs in the social and cultural fields.
The current study tries to tackle the socio-cultural dimensions of the blogs by means of showing how the blogs construct the self. The researcher is going to conduct interviews with the bloggers. He will also carry out a semiotic analysis that may reveal the strategies used by the bloggers. Besides, he tries to identify the realistic and traditional frames in which the social relationships are buil
Before users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation stra
... Show More