Preferred Language
Articles
/
jcoeduw-1291
The poetry of the sensory image of Ibn Dannir al-Musli poems (B627 H.)
...Show More Authors

تُعبّرُ الصُّورةُ الحسَّيةُ في شعرِ ابن دُنَينير الموصليِّ([i]) في بنيتها عن تجربةِ الشاعرِ الوجدانيةِ والذهنيةِ, وأفكارهِ ومشاعرِهِ؛ فيصوغُ بها مَفهومًا جديدًا للواقعِ الماديِّ والمعنويِّ، الذي يتسمُ بالوضوحِ أولاً، وبالقرْبِ من الذهنِ ثانيًا، للربْطِ بين الحواسِّ الإنسانيةِ والمعاني الذهنيةِ، لِتُقَدِّمَ الصُّورةُ الحسيَّةُ إلى ((المتلقي صُورًا مرئيةً، يُعادُ تشكيلُها سياقيًّا بتغيراتٍ مُناسبةٍ مع الرؤيةِ الحقيقيةِ التي تتسرَّبُ فاعليتُها إلى المخيلةِ ببصيرةِ الذهنِ))([ii])، إذ تُنسقُ بنيةُ الصُّورةِ الحسيَّةِ الأفكارَ والمشاعرَ في إطارٍ ذهنيٍّ يَضبطُ المعالمَ الداخليةَ والخارجيةَ للوجودِ، فتؤلِّفُ الحواسُّ صُورةً جديدةً للواقعِ والإحساسِ المفْعَمِ بالجمالِ، تُدْركُ بالحسِّ والخيالِ، لأنَّ ((الحواسَّ بهذا المعنَى تكونُ بمثابةِ الجسرِ الذي يُوصِلُ بين العالمِ الخارجيِّ وإحساسَاتِنا الداخلَيةِ))([iii])، إذ تتجاذبُ الصُّورةُ الحسَّيةُ أركانَها التصويريةَ- البنائيَّةَ منْ مَصدرَيْن: مَصدرٌ منَ الحواسِّ الإنسانيةِ، ومَصدرٌ منَ الإدراكِ الجماليِّ، ثم يتفاعلُ المصدرانِ تفاعلاً مَعنويًّا في إثراءِ بنيةِ الصُّورةِ الحسيَّةِ، وتظهرُ فاعليةُ الصُّورةِ الحسيَّةِ عند الشاعرِ بتأجُّجِ انفعالاتِهِ الشعوريَّةِ الحسيَّةِ، في تشكيلِ الصُّورةِ وإبرازِها، إذ تُثيرُ الحواسُّ الإنسانيةُ داخلَ الصُّورةِ الحسيَّةِ بُؤرًا مُشعَّةً ينطلقُ منها الشاعرُ لجلْبِ الإدراكِ الحسيِّ الجماليِّ، وإثارةِ المشاعرِ والأفكارِ التي تُشكِّلُ الصُّورةَ الحسيَّةَ, وتُفيدُ صِياغَتها وبناءَهَا.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Modern Applied Science
Hybrid Methodology for Image Segmentation Based on Active Contour Module and Alpha-Shape Theory
...Show More Authors

The concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s

... Show More
Publication Date
Thu Jun 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Image encryption based on combined between linear feedback shift registers and 3D chaotic maps
...Show More Authors

Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Thu Aug 02 2018
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Performance Study for Mixed Transforms Generated by Tensor Product in Image Compression and Processing
...Show More Authors

In all applications and specially in real time applications, image processing and compression plays in modern life a very important part in both storage and transmission over internet for example, but finding orthogonal matrices as a filter or transform in different sizes is very complex and importance to using in different applications like image processing and communications systems, at present, new method to find orthogonal matrices as transform filter then used for Mixed Transforms Generated by using a technique so-called Tensor Product based for Data Processing, these techniques are developed and utilized. Our aims at this paper are to evaluate and analyze this new mixed technique in Image Compression using the Discrete Wavelet Transfo

... Show More
Publication Date
Sun Jul 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Breast Cancer MRI Classification Based on Fractional Entropy Image Enhancement and Deep Feature Extraction
...Show More Authors

Disease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature

... Show More
View Publication Preview PDF
Scopus (26)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Européen Des Systèmes Automatisés​
Deep Learning Approach for Oil Pipeline Leakage Detection Using Image-Based Edge Detection Techniques
...Show More Authors

Natural gas and oil are one of the mainstays of the global economy. However, many issues surround the pipelines that transport these resources, including aging infrastructure, environmental impacts, and vulnerability to sabotage operations. Such issues can result in leakages in these pipelines, requiring significant effort to detect and pinpoint their locations. The objective of this project is to develop and implement a method for detecting oil spills caused by leaking oil pipelines using aerial images captured by a drone equipped with a Raspberry Pi 4. Using the message queuing telemetry transport Internet of Things (MQTT IoT) protocol, the acquired images and the global positioning system (GPS) coordinates of the images' acquisition are

... Show More
View Publication
Scopus (12)
Crossref (5)
Scopus Crossref
Publication Date
Wed Aug 07 2019
Journal Name
Iraqi National Journal Of Nursing Specialties
Nurses' Knowledge toward Care of Unconscious Adult Patients at Teaching Hospitals in Al-Hilla City
...Show More Authors

Objective: The study aims to evaluate nurses' knowledge toward care of unconscious adult patients and identify the relationship between nurses’ knowledge toward care of unconscious adult patient and their demographic characteristics of age, gender, Marital Status, level of qualification and years of experience. Methodology: A descriptive study (quantitative design) was carried out by using quasi experimental design to study nurses' knowledge, attitudes and practices toward care of unconscious adult patients at teaching hospitals in Al-Hilla City from September 2018 up to June 2019. A purposively sample has been chosen in which included 60 nurses who work in ICUs within two hospitals (Imam Al-Sadiq teaching hospital and Al-Hilla general

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
The effect of strategic alignment on the reputation of the organization
...Show More Authors

 

The current study aims to determine the extent of SOMO's interest in strategic alignment operations and whether this interest is sufficient to be reflected in enhancing its organizational reputation. The field of research was in the oil marketing company SOMO. The managers in the top management within this company were targeted and the questionnaire was used as a data collection tool. The study population (109), (105) questionnaires were distributed, (94) questionnaires and (11) questionnaires were not retrieved, and the valid questionnaires had reached (91) and the analytical and descriptive approach was used for the study, the current research found to find A direct relationship and a positive effect of strategic

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Aware of the roots of the text in the arab heritage
...Show More Authors

Text science presented a set of criteria to make the text essentially a project to create
texts and use. Me and means of cohesion script text scientists, two standard foundries and
knitting. Find this means their equivalent in the Arab rhetorical Heritage has been found, it
means foundries find Accompanying represented (link grammar in the classroom and link),
and referrals represented by (Baldmair, Ldefinition, and the name of the signal), and
deletion, and repetition, and presentation delays. As in the standard knitting it has confirmed
Albulagjun Arabs on the semantic consistency between the text components, as reflected in
the moral link in Chapter interfaces, as well as in moral coherence between parts of the te

... Show More
View Publication Preview PDF