Preferred Language
Articles
/
jcoeduw-1291
The poetry of the sensory image of Ibn Dannir al-Musli poems (B627 H.)
...Show More Authors

تُعبّرُ الصُّورةُ الحسَّيةُ في شعرِ ابن دُنَينير الموصليِّ([i]) في بنيتها عن تجربةِ الشاعرِ الوجدانيةِ والذهنيةِ, وأفكارهِ ومشاعرِهِ؛ فيصوغُ بها مَفهومًا جديدًا للواقعِ الماديِّ والمعنويِّ، الذي يتسمُ بالوضوحِ أولاً، وبالقرْبِ من الذهنِ ثانيًا، للربْطِ بين الحواسِّ الإنسانيةِ والمعاني الذهنيةِ، لِتُقَدِّمَ الصُّورةُ الحسيَّةُ إلى ((المتلقي صُورًا مرئيةً، يُعادُ تشكيلُها سياقيًّا بتغيراتٍ مُناسبةٍ مع الرؤيةِ الحقيقيةِ التي تتسرَّبُ فاعليتُها إلى المخيلةِ ببصيرةِ الذهنِ))([ii])، إذ تُنسقُ بنيةُ الصُّورةِ الحسيَّةِ الأفكارَ والمشاعرَ في إطارٍ ذهنيٍّ يَضبطُ المعالمَ الداخليةَ والخارجيةَ للوجودِ، فتؤلِّفُ الحواسُّ صُورةً جديدةً للواقعِ والإحساسِ المفْعَمِ بالجمالِ، تُدْركُ بالحسِّ والخيالِ، لأنَّ ((الحواسَّ بهذا المعنَى تكونُ بمثابةِ الجسرِ الذي يُوصِلُ بين العالمِ الخارجيِّ وإحساسَاتِنا الداخلَيةِ))([iii])، إذ تتجاذبُ الصُّورةُ الحسَّيةُ أركانَها التصويريةَ- البنائيَّةَ منْ مَصدرَيْن: مَصدرٌ منَ الحواسِّ الإنسانيةِ، ومَصدرٌ منَ الإدراكِ الجماليِّ، ثم يتفاعلُ المصدرانِ تفاعلاً مَعنويًّا في إثراءِ بنيةِ الصُّورةِ الحسيَّةِ، وتظهرُ فاعليةُ الصُّورةِ الحسيَّةِ عند الشاعرِ بتأجُّجِ انفعالاتِهِ الشعوريَّةِ الحسيَّةِ، في تشكيلِ الصُّورةِ وإبرازِها، إذ تُثيرُ الحواسُّ الإنسانيةُ داخلَ الصُّورةِ الحسيَّةِ بُؤرًا مُشعَّةً ينطلقُ منها الشاعرُ لجلْبِ الإدراكِ الحسيِّ الجماليِّ، وإثارةِ المشاعرِ والأفكارِ التي تُشكِّلُ الصُّورةَ الحسيَّةَ, وتُفيدُ صِياغَتها وبناءَهَا.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimation Optimal Threshold Value for Image Edge Detection
...Show More Authors

      A new approach presented in this study to determine the optimal edge detection threshold value. This approach is base on extracting small homogenous blocks from unequal mean targets. Then, from these blocks we generate small image with known edges (edges represent the lines between the contacted blocks). So, these simulated edges can be assumed as true edges .The true simulated edges, compared with the detected edges in the small generated image is done by using different thresholding values. The comparison based on computing mean square errors between the simulated edge image and the produced edge image from edge detector methods. The mean square error computed for the total edge image (Er), for edge regio

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes On Data Engineering And Communications Technologies
Utilizing Deep Learning Technique for Arabic Image Captioning
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Aug 05 2016
Journal Name
International Journal Of Advances In Scientific Research And Engineering
Image Encryption Using Modified AES with Bio-Chaotic
...Show More Authors

Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.

View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
International Journal Of Image And Data Fusion
Image edge detection operators based on orthogonal polynomials
...Show More Authors

View Publication
Scopus (32)
Crossref (10)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Computer Applications
Content-based Image Retrieval (CBIR) using Hybrid Technique
...Show More Authors

Image retrieval is used in searching for images from images database. In this paper, content – based image retrieval (CBIR) using four feature extraction techniques has been achieved. The four techniques are colored histogram features technique, properties features technique, gray level co- occurrence matrix (GLCM) statistical features technique and hybrid technique. The features are extracted from the data base images and query (test) images in order to find the similarity measure. The similarity-based matching is very important in CBIR, so, three types of similarity measure are used, normalized Mahalanobis distance, Euclidean distance and Manhattan distance. A comparison between them has been implemented. From the results, it is conclud

... Show More
View Publication
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Content Based Image Retrieval (CBIR) by Statistical Methods
...Show More Authors

            An image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T-

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Bio-inspired Computing – Theories And Applications
Image Segmentation Using Membrane Computing: A Literature Survey
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Image Compression Using 3-D Two-Level Technique
...Show More Authors

In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent r

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Engineering And Technology Journal
Face Retrieval Using Image Moments and Genetic Algorithm
...Show More Authors

Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF