Preferred Language
Articles
/
Txcp140BVTCNdQwCRyZt
Semantic image coding in contemporary Theatrical performance
...Show More Authors

تعد مجالات الصورة وعلاماتها الحركية حضوراً دلالياً للاتصال العلامي واتساعاً في الرابطة الجدلية ما بين الدوال ومداليها، التي تقوم بها الرؤية الاخراجية لإنتاج دلالات اخفائية تمتلك جوهرها الانتقالي عبر الافكار بوصفها معطيات العرض، ويسعى التشفير الصوري الى بث ثنائية المعنى داخل الحقول المتعددة للعرض المسرحي، ولفهم المعنى المنبثق من هذه التشفيرات البصرية، تولدت الحاجة لبحث تشكيل هذه التشفيرات وكيفية تحولها لصور بصرية. وتناول الباحثان في المقدمة مشكلة البحث، وهي: كيف تتم عملية التشفير الصوري والدلالي في العرض المسرحي؟ وتتبع اثراء العلامات وشفراتها لانتاج منظومه صورية متكاملة بدلالاتها ومداليلها لتمثل مرجعاً خصباً للتشفير الدلالي وقد اسسا الباحثان اطارا نظريا تضمن مبحثان هما: المبحث الاول(التشفير وانتاج الدلالات) والمبحث الثاني (التشفير الدلالي في التجارب الاخراجية), ثم استقى الباحثان مجموعة مؤشرات تم اعتمادها في تحليل عينة البحث، وهي (مجموعة من النصوص تم ادخالها في نص واحد وتم عرضها في المسرح بطريقة المسرح الأسود)، على وفق المنهج الوصفي، وبعدها توصل الباحثان الى مجموعة نتائج منها: (اسهمت الايماءة والصوت والحركة في جعل الدوال اداةً فاعلة في تشكيل الصورة البصرية المشفرة، والتي انتجت انتشاراً دلالياً في العرض المسرحية), ثم قائمة المصادر وملخص باللغة الانكليزية.

View Publication
Publication Date
Mon Sep 09 2024
Journal Name
مجلة قسم الدراسات اللغوية و الترجمية التابعة لبيت الحكمة
- Structural and semantic features of predicative adverbs IN THE RUSSIAN SYNTAX SYSTEM
...Show More Authors

Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Current Researches On Educational Studies
Study of Swear Words in Selected Literary Works: A Syntactic-Semantic Analysis
...Show More Authors

BN RASHİD, 2022

View Publication
Publication Date
Thu Dec 01 2022
Journal Name
مجلة األستاذ للعلوم اإلنسانية واالجتماعية
THE ANALYSIS OF SEMANTIC MACRO STRUCTURE IN WHO SPEECHES DURING CORONA VIRUS
...Show More Authors

Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Semantic Exchange A study of rooting the term
...Show More Authors

The term "semantic exchange" was popularized in Arabic, especially in derivatives, grammatical structures, etc., but it came under different names or terms, including deviation, deviation, transition, displacement, tooth breach, replacement, attention, etc. In the rooting of this term through its study in language and terminology, and among linguists, grammar and others, we have reached a number of results, including The existence of a harmonization between the lexical and idiomatic meaning of the term exchange, and the phenomenon of semantic exchange is a form of expansion in language, and that the first language scientists They had turned to this And studied under Cairo for different names, as noted above.

View Publication Preview PDF
Publication Date
Tue May 16 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Watermarking in Medical Image
...Show More Authors

Medical image security is possible using digital watermarking techniques. Important information is included in a host medical image in order to provide integrity, consistency, and authentication in the healthcare information system. This paper introduces a proposed method for embedding invisible watermarking in the 3D medical image. The cover medical image used is DICOM which consists of a number of slices, each one representing a sense, firstly must separate the ROI (Region of Interest) and NROI (Not Region Of Interest) for each slice, the separation process performed by the particular person who selected by hand the ROI. The embedding process is based on a key generated from Arnold's chaotic map used as the position of a pixel in

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
Theatrical Play Strategy in Enabling and Constructing the Child's Character: سافرة ناجي جاسم
...Show More Authors

  Since the human being knew simulation as an expressive style of expressing himself which developed into dramatic arts that have their aesthetic uniqueness involving their own constructive techniques, the art of the theatre had a pioneering role in the development of the human awareness of himself. That’s why it was and still is in all its aesthetic manifestations a free space for the self –disclosure thus man has been simulated as he is the main theme of the existence and its main wealth. Thus the interest in the child's theatre began, because this theatrical pattern has its effectiveness in the construction of the human self and enabling it to be a productive source for a life that accommodates and elevates the human action t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
the indication of the scene as a symbolic system in the Iraqi theatrical
...Show More Authors

The theatrical view reflects various connotations and intellectual and aesthetic implications, as the view includes a symbolic geometric, architectural and archetypal connotation suggestive of reality and nature, as theatrical art is the woman that reflects reality, specifically the significance of the theatrical view that reveals to us the philosophical, aesthetic and cognitive dimensions of theatrical trends, so the research came with the methodological framework, which It included the research problem (what is the significance of the scene as a symbolic system in the Iraqi theatrical performance), the importance of the research and the need for it, the research objective, the limits of the research and the most important terms.
A

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
Visual Exciter of Theatrical Techniques in the Iraqi Theater Show: شيماء حسين طاهر
...Show More Authors

The theatrical show consists of theatrical techniques that form the space to display the play that may form conscious visual effects about the receiver. The current search included the (Research problem) which is the immediate question ((What makes the theatrical techniques dazzling and visually exciting in a certain theatrical show?))
It also included (the importance of research) by highlighting the importance of theatrical techniques and the mechanism of contrast.
It also identified the visual stimulus of theatrical techniques in the theater show.
It also included the (research limits), which were temporally determined by the period (1990-1998) and spatially, the Iraqi theater shows (Baghdad), in which theatrical techniques c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
...Show More Authors

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a

... Show More
View Publication Preview PDF
Crossref