ملخص البحث: تناول البحث الحالي:(أنظمة التكوين الجمالي للكتابات والنصوص في النحت العربي المعاصر)، عددا من الأفكار الأساسية التي تمثل المادة النظرية لتفسير ظاهرة الكتابة في الفن بشكل عام وفي فن النحت بشكل خاص، ولكشف أنظمة التكوين الجمالي وأنواعها المتعددة من خلال فحص بعض النصوص البصرية للفنانين العرب المعاصرين، فقد جاء هذا البحث في أربعة فصول. خصص الفصل الأول: الإطار المنهجي للبحث لبيان مشكلة البحث، وأهميته، وهدف البحث، ثم حدود البحث الموضوعية والمكانية والزمانية، التي تحددت بالمنحوتات ذات الأشكال الحروفية المنفذة في المنطقة العربية، ثم تحديد المصطلحات. أما الفصل الثاني: الإطار النظري للبحث فقد شمل ثلاثة مباحث خصص الأول منها والموسوم: المفهوم الجمالي للكتابة، لدراسة مفهوم الكتابة من كافة جوانبه النظرية، أما المبحث الثاني الموسوم: أنظمة التكوين الجمالي، فقد تم دراسة أربعة نقاط فيه وهي: أولاً: التكوين الجمالي للكتابة في المنحوتات، ثانياً: حركة عناصر شكل الكتابة في النحت، ثالثاً: التكوين الجمالي للفضاء الخارجي والداخلي، رابعاً: التكوين الجمالي للاختزال. أما المبحث الثالث الموسوم: أنواع التكوينات الجمالية في فن النحت، فقد تم دراسة أربعة نقاط وهي: 1.التكوين الجمالي الدائري والكروي، 2.التكوين الجمالي الأفقي والمستعرض، 3.التكوين الجمالي الطولي والعمودي، 4.التكوين الجمالي الهرمي والمثلث. أما الفصل الثالث: الإطار الإجرائي للبحث فقد شمل على مجتمع البحث وعينته المتكونة من ثلاثة أعمال فنية للفنان إياد الحسيني، وتم اختيار هذه العينة بطريقة قصدية، لتمثل المجتمع الكلي، ولتحقق أهداف البحث وحدوده الموضوعية والمكانية، ثم تحليل العينة. أما الفصل الرابع: نتائج البحث فقد خصص لنتائج البحث التي توصل إليها، كما تضمن الفصل عددا من التوصيات والمقترحات.
A field experiment was conducted at Abu-Ghrib during 2013- 2014 season to study the effect of harrowing systems on the decomposition and fermentation on organic matter(OM) when added and mixed with the soil under special technology, as well as its effect on the growth parameters and productivity of (Zea mays L. 5018). The experiment was laid out using factorial randomized complete block design (RCBD) in split-split design with three replications in SCL bare soil with a percent of moisture ranged from 16 – 18 %. The main plots were designated to the two systems of harrowing (Rotary Harrowand Disc Harrow ). The sub main plots were specified for two organic matters ( Sheep manure ,cow manure ) . Data were statistically analyzed, and
... Show More- Islamic art is applied art that searches for everything that is useful and beneficial and Both are properties of Islamic art. Islamic art has many well-established elements and styles and pictures that distinguish it from the rest of the arts among those elements and methods that were used in the architectural cladding artwork Or mosaic murals and mosaic was known in its first form in Babylon in a primitive style similar to it, but the Muslim artist in the era of the Caliphs made the art of mosaic In mosques and palaces.
Chapter one: This chapter is concerned with introducing the art of mosaic historically and focusing on it.
Chapter Two: This chapter deals with contemporary Islamic mosaics, especially in Mecca
Background: Restoration of root canal treated teeth with a permanent restoration affect in the success of endodontically treated teeth. This in vitro study was performed to evaluate and compare the fracture strength of endodontically treated teeth restored by using custom made zirconium posts and cores, prefabricated carbon fiber, glass fiber and zirconium ceramic posts. Materials and method: Forty intact human mandibular second premolars were collected for this study and were divided into five groups. Each group contains 8 specimens: Group1: Teeth restored with Carbon Fiber Posts; Group2: Teeth restored with Glass Fiber Posts; Group3: Teeth restored with Zirconium Ceramic prefabricated Posts; Group4: Teeth restored with Zirconium Posts
... Show MoreIn wireless broadband communications using single-carrier interleave division multiple access (SC-IDMA) systems, efficient multiuser detection (MUD) classes that make use of joint hybrid decision feedback equalization (HDFE)/ frequency decision-feedback equalization (FDFE) and interference cancellation (IC) techniques, are proposed in conjunction with channel coding to deal with several users accessing the multipath fading channels. In FDFE-IDMA, the feedforward (FF) and feedback (FB) filtering operations of FDFE, which use to remove intersymbol interference (ISI), are implemented by Fast Fourier Transforms (FFTs), while in HDFE-IDMA the only FF filter is implemented by FFTs. Further, the parameters involved in the FDFE/
... Show MoreThere are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show MoreThis article explores the process of VGI collection by assessing the relative usability and accuracy of a range of different methods (Smartphone GPS, Tablet, and analogue maps) for data collection amongst different demographic and educational groups, and in different geographical contexts. Assessments are made of positional accuracy, completeness, and data collectors’ experiences with reference to the official cadastral data and the administration system in a case-study region of Iraq. Ownership data was validated by crowd agreement. The result shows that successful VGI projects have access to varying data collection methods.
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreWhile conservative access preparations could increase fracture resistance of endodontically treated teeth, it may influence the shape of the prepared root canal. The aim of this study was to compare the prepared canal transportation and centering ability after continuous rotation or reciprocation instrumentation in teeth accessed through traditional or conservative endodontic cavities by using cone-beam computed tomography (CBCT).
Forty extracted intact, matured, and 2-rooted human maxillary first premolars were selected for this