Arabic calligraphy has a special status as one of the most important oriental arts, which has been enhanced by the Islamic value. The Arabic fonts have been diverse in their classification into soft lines such as Diwani, thuluth and patch lines and others, and geometrical lines such as Kufic lines and their various types. The contemporary artist was also able to adapt the Arabic calligraphy of all kinds in the construction of the painting or line formations, especially after the development of the artistic digital techniques and computer software. Here comes the role of the industrial designer as being more in touch with the practical, technical and productive life, which requires great care in adapting the line formations of the Arabic letters in the contemporary industrial production design. Throughout what has been mentioned, the present research highlights those attempts and experiments made by the industrial designer in his dealings with the Arabic line formations. The research consists of the methodological framework where the researcher identified the problem of research in asking the following question: Does the Arabic line design have a function reflected in the contemporary industrial product? The objective of the research was to identify the effectiveness of employing Arabic calligraphy formulations and their implications in the design of industrial products. The limits of research were the industrial products, which include the Arabic line formations produced between the years 2017 and 2018. The theoretical framework divided the chapter into two sections. The first is to study the aesthetics of the Arabic calligraphy formation in the design of the industrial product, while the second section included the study of the problems of Arabic calligraphy in the employment of the industrial product. The most important theoretical framework indicators have been listed in addition to the research procedures, the analysis of the models, which were (3) intentionally selected models, as well as the most important results, including:The heritage and historical presence in the inspiration of the heritage vocabulary, especially the letter formations of soft Arabic lines, which cannot be easily controlled and adapted because they are governed by strict rules as they represent Islamic and Arab specificity as part of the Arab-Islamic heritage
Laser is a powerful device that has a wide range of applications in fields ranging from materials science and manufacturing to medicine and fibre optic communications. One remarkable
Essential approaches involving photons are among the most common uses of parallel optical computation due to their recent invention, ease of production, and low cost. As a result, most researchers have concentrated their efforts on it. The Basic Arithmetic Unit BAU is built using a three-step approach that uses optical gates with three states to configure the circuitry for addition, subtraction, and multiplication. This is a new optical computing method based on the usage of a radix of (2): a binary number with a signed-digit (BSD) system that includes the numbers -1, 0, and 1. Light with horizontal polarization (LHP) (↔), light with no intensity (LNI) (⥀), and light with vertical polarization (LVP) (↨) is represen
... Show MoreIn order to promote sustainable steel-concrete composite structures, special shear connectors that can facilitate deconstruction are needed. A lockbolt demountable shear connector (LB-DSC), including a grout-filled steel tube embedded in the concrete slab and fastened to a geometrically compatible partial-thread bolt, which is bolted on the steel section's top flange of a composite beam, was proposed. The main drawback of previous similar demountable bolts is the sudden slip of the bolt inside its hole. This bolt has a locked conical seat lug that is secured inside a predrilled compatible counter-sunk hole in the steel section's flange to provide a non-slip bolt-flange connection. Deconstruction is achieved by demounting the tube from the t
... Show More(Abstract)
A man find himself in front of narrative literal productions when he read the title of this paper that deals with specialist , followers of Arabic literal narration productions through the era of Arabic literature in a period arrived to 1500 years. It is strange to present (Narration art in Arabic heritage) , in addition to (Arabic diwan) . This matter introduces us to come back to the past to inspect Arabic narration production , specially that is called (Artistic narration ) which is full ,variety of purposes and goals.
This study deals with it the era of Taher Bin Al Hussein for his son Abdullah when preside Diyarbakir and Rabia in succession of ALMa`amoon Abbasi in the political and historical dimensions
The history of nations & civilizations shaped with its intellectual and cultural heritage and accumulation of met through the stages and years
النحت العربي في جنوب شبه الجزيرة العربية (اليمن) قبل الاسلام
This research deals with the frameworks and mechanisms of international press coverage of the issue of foreign interference in the formation of the Iraqi government in the Saudi newspapers Asharq Al-Awsat and Kayhan Al-Arabi Iran and how this topic was addressed in the two newspapers. The frameworks for international press coverage of external interference in the formation of the Iraqi government. ”This research is one of the descriptive research that adopted the survey method، which made it possible to use the content analysis tool to analyze
the content of the two newspapers، whose numbers are (624) from the
newspapers (Al-Sharq Al-Awsat Al-Saudi Arabia and Kayhan Al-Arabi Iran) from (1/1/2018 to 31/12/2018)، and the researc
As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show More