تعد مجالات الصورة وعلاماتها الحركية حضوراً دلالياً للاتصال العلامي واتساعاً في الرابطة الجدلية ما بين الدوال ومداليها، التي تقوم بها الرؤية الاخراجية لإنتاج دلالات اخفائية تمتلك جوهرها الانتقالي عبر الافكار بوصفها معطيات العرض، ويسعى التشفير الصوري الى بث ثنائية المعنى داخل الحقول المتعددة للعرض المسرحي، ولفهم المعنى المنبثق من هذه التشفيرات البصرية، تولدت الحاجة لبحث تشكيل هذه التشفيرات وكيفية تح
... Show MoreWA Shukur, FA Abdullatif, Ibn Al-Haitham Journal For Pure and Applied Sciences, 2011 With wide spread of internet, and increase the price of information, steganography become very important to communication. Over many years used different types of digital cover to hide information as a cover channel, image from important digital cover used in steganography because widely use in internet without suspicious.
JPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.
The study discusses the marketing profile of electoral candidates and politicians especially the image that takes root in the minds of voters has become more important than the ideologies in the technological era or their party affiliations and voters are no longer paying attention to the concepts of a liberal, conservative, right-wing or secular, etc. while their interests have increased towards candidates. The consultants and image experts are able to make a dramatic shift in their electoral roles. They, as specialists in the electoral arena, dominate the roles of political parties.
The importance of the study comes from the fact that the image exceeds its normal framework in our contemporary world to become political and cultural
Background: Economic Globalization affects work condition by increasing work stress. Chronic work stress ended with burnout syndrome.
Objectives: To estimate the prevalence of burnout syndrome and the association of job title, and violence with it among physicians in Baghdad, and to assess the burnout syndrome at patient and work levels by structured interviews.
Subjects and Methods: A cross section study was conducted on Physicians in Baghdad. Sampling was a multistage, stratified sampling to control the confounders in the design phase. A mixed qualitative and quantitative
... Show MoreBackground: Economic Globalization affects work condition by increasing work stress. Chronic work stress ended with burnout syndrome. Objectives: To estimate the prevalence of burnout syndrome and the association of job title, and violence with it among physicians in Baghdad, and to assess the burnout syndrome at patient and work levels by structured interviews. Subjects and Methods: A cross section study was conducted on Physicians in Baghdad. Sampling was a multistage, stratified sampling to control the confounders in the design phase. A mixed qualitative and quantitative approach (triangulation) was used. Quantitative method used self-administered questionnaires of Maslach Burn out Inventory. Qualitative approach used an open-end
... Show MoreA ventricular septal defect (VSD) is defined as a communication between the left and right ventricles or between the left ventricle and the right atrium. VSDs are amongst the most common abnormalities of the heart. They can be present in isolation or in association with other congenital cardiac abnormalities. This is study done with the aim to evaluate the types, size, associated CHD with ventricular septal defect in children and adolescent in two cardiac centers (Medical City Complex cardiac clinics, Ibn Al Nafaes teaching hospital) in Baghdad - Iraq
Rotaviruses, a major cause of gastroenteritis in children worldwide accounts for around half a million deaths annually. Vaccine against the virus has been recommended by the WHO to be involved in the national immunization program.To evaluate the genetic characterization of rotavirus among children with acute gastroenteritis in Babylon province is warranted. Children complained of diarrhea with rotavirus infection detected in their stool were involved in the study. The age range was 10 months to 60 months and with retrogradechecking of rotavirus vaccine history. Rotavirus genotypes were detected by reverse transcription-polymerase chain reaction (RT-PCR).A total number of 40 children with rotavirus gastroenteritis were used to examine the
... Show MoreThis study is marked by: The ignorant poem and body language
Its main objective is to reveal the manifestations of this language in the text mentioned, and accordingly, the sieve poem has been read semantic (semantic) and hermeneutic, revealing the poet's ability to employ symbols and signals (body language) in the poem chosen for this purpose; The existence of such language in pre-Islamic poetry. After a long reflection and reading, the signs and symbols of the physical movement of the body, and its feminine and aesthetic manifestations were identified, and this was achieved through the use of modern critical methodologies that directly affect this language. The study consisted of an introduction and three topics, followed by t
It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.