OpenArt Logo
Sign in

Yinon Rubinov

Yinon Rubinov

Model: OpenArt SDXL

Prompt:

female IDF soldier coding
Width: 1024
Height: 1024
Scale: 7
Steps: 25
Seed: 1375893224
Sampler: DPM++ 2M SDE Karras

Create your first image using OpenArt.

With over 100+ models and styles to choose from, you can create stunning images.

More images like this
Prompt: IDF soldiers, both male and female, specializing in information systems within the Enigma program. They are managing and optimizing databases, ensuring efficient data flow and secure storage for critical military operations
Prompt: IDF soldiers (both genders) coding in computer and testing automation scripts in Python, facilitating the efficient management and scaling of military IT infrastructure
Prompt: IDF communication systems technicians, both male and female, actively managing and troubleshooting network issues in real-time during an emergency. They are equipped with advanced tools, ensuring continuous and efficient communication across all field operations
Prompt: IDF Agam program graduates, both male and female, applying their skills in data processing and intelligence analysis within the central collection unit. They are utilizing cutting-edge computer systems to interpret and deliver critical information to support military operations
Prompt: male and female IDF soldier programming code
Prompt: IDF cyber soldiers, both male and female, engaging in classified technological operations within the cyber units of Military Intelligence. They are applying foundational cyber skills acquired in the Amnon course to support critical missions
Prompt: IDF soldiers, both male and female, implementing their web development skills in a real-world scenario, creating digital training modules for other soldiers. They are in a well-equipped military tech center, collaborating and coding
Prompt: IDF soldier programming (male/female)
Prompt: A team of IDF soldiers, including both men and women, using their knowledge in computer science and data science to develop advanced intelligence-gathering tools. They are leveraging big data analytics to identify emerging threats and support decision-making processes