Preferred Language
Articles
/
jcoeduw-1291
The poetry of the sensory image of Ibn Dannir al-Musli poems (B627 H.)
...Show More Authors

تُعبّرُ الصُّورةُ الحسَّيةُ في شعرِ ابن دُنَينير الموصليِّ([i]) في بنيتها عن تجربةِ الشاعرِ الوجدانيةِ والذهنيةِ, وأفكارهِ ومشاعرِهِ؛ فيصوغُ بها مَفهومًا جديدًا للواقعِ الماديِّ والمعنويِّ، الذي يتسمُ بالوضوحِ أولاً، وبالقرْبِ من الذهنِ ثانيًا، للربْطِ بين الحواسِّ الإنسانيةِ والمعاني الذهنيةِ، لِتُقَدِّمَ الصُّورةُ الحسيَّةُ إلى ((المتلقي صُورًا مرئيةً، يُعادُ تشكيلُها سياقيًّا بتغيراتٍ مُناسبةٍ مع الرؤيةِ الحقيقيةِ التي تتسرَّبُ فاعليتُها إلى المخيلةِ ببصيرةِ الذهنِ))([ii])، إذ تُنسقُ بنيةُ الصُّورةِ الحسيَّةِ الأفكارَ والمشاعرَ في إطارٍ ذهنيٍّ يَضبطُ المعالمَ الداخليةَ والخارجيةَ للوجودِ، فتؤلِّفُ الحواسُّ صُورةً جديدةً للواقعِ والإحساسِ المفْعَمِ بالجمالِ، تُدْركُ بالحسِّ والخيالِ، لأنَّ ((الحواسَّ بهذا المعنَى تكونُ بمثابةِ الجسرِ الذي يُوصِلُ بين العالمِ الخارجيِّ وإحساسَاتِنا الداخلَيةِ))([iii])، إذ تتجاذبُ الصُّورةُ الحسَّيةُ أركانَها التصويريةَ- البنائيَّةَ منْ مَصدرَيْن: مَصدرٌ منَ الحواسِّ الإنسانيةِ، ومَصدرٌ منَ الإدراكِ الجماليِّ، ثم يتفاعلُ المصدرانِ تفاعلاً مَعنويًّا في إثراءِ بنيةِ الصُّورةِ الحسيَّةِ، وتظهرُ فاعليةُ الصُّورةِ الحسيَّةِ عند الشاعرِ بتأجُّجِ انفعالاتِهِ الشعوريَّةِ الحسيَّةِ، في تشكيلِ الصُّورةِ وإبرازِها، إذ تُثيرُ الحواسُّ الإنسانيةُ داخلَ الصُّورةِ الحسيَّةِ بُؤرًا مُشعَّةً ينطلقُ منها الشاعرُ لجلْبِ الإدراكِ الحسيِّ الجماليِّ، وإثارةِ المشاعرِ والأفكارِ التي تُشكِّلُ الصُّورةَ الحسيَّةَ, وتُفيدُ صِياغَتها وبناءَهَا.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
International Journal Of Computer Science And Mobile Computing
Hierarchical Fixed Prediction of Mixed based for Medical Image Compression.
...Show More Authors

Publication Date
Fri Jun 20 2014
Journal Name
Jurnal Teknologi
A Review of Snake Models in Medical MR Image Segmentation
...Show More Authors

Developing an efficient algorithm for automated Magnetic Resonance Imaging (MRI) segmentation to characterize tumor abnormalities in an accurate and reproducible manner is ever demanding. This paper presents an overview of the recent development and challenges of the energy minimizing active contour segmentation model called snake for the MRI. This model is successfully used in contour detection for object recognition, computer vision and graphics as well as biomedical image processing including X-ray, MRI and Ultrasound images. Snakes being deformable well-defined curves in the image domain can move under the influence of internal forces and external forces are subsequently derived from the image data. We underscore a critical appraisal

... Show More
Scopus (10)
Scopus
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
Study of contrast between satellite image data and ground data
...Show More Authors

Spot panchromatic satellite image had been employed to study and know the difference Between ground and satellite data( DN ,its values varies from 0-255) where it is necessary to convert these DN values to absolute radiance values through special equations ,later it converted to spectral reflectance values .In this study a monitoring of the environmental effect resulted from throwing the sewage drainages pollutants (industrial and home) into the Tigris river water in Mosul, was achieved, which have an effect mostly on physical characters specially color and turbidity which lead to the variation in Spectral Reflectance of the river water ,and it could be detected by using many remote sensing techniques. The contaminated areas within th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Hybrid Color Image Compression of Hard & Soft Mixed Thresholding Techniques
...Show More Authors

Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
Images of Woman, She-Camel and Horse and Their Manifestations in Tarafah-ibnulAbd's Poetry between Symbolic Reference and Poetic Function
...Show More Authors

This paper tries to understand the poetic reference in the images of woman, she-camel, horse and their manifestations in Tarafah-ibnulAbd's poetry. There has got my attention the fact that these three images have their own distinct taste which is characterised by a clear rhythm, let alone the  lively nature that is filled with liveliness and activity to be in harmony with the poet's youth. For these three images represented the best manifestations of his psychological and artistic poetics. The paper adopts an artistic analysis to arrive at the psychological aspects of these experiences-the woman, the she-camel, and the horse- and to understand the functions of their images and symbolic reference.

View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Comparative Study for Risk Criteria of Al-Qudus Plant between the Present and Planning of MOE
...Show More Authors

The main function of a power system is to supply the customer load demands as economically as possible. Risk criterion is the probability of not meeting the load. This paper presents a methodology to assess probabilistic risk criteria of Al-Qudus plant before and after expansion; as this plant consists of ten generating units presently and the Ministry Of Electricity (MOE) is intending to compact four units to it in order to improve the performance of Iraqi power system especially at Baghdad region. The assessment is calculated by a program using Matlab programming language; version 7.6. Results show that the planned risk is (0.003095) that is (35 times) less than that in the present plant risk; (0.1091); which represents respectable imp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Tue Mar 08 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key

... Show More
View Publication
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Lossless and Lossy Polynomial Image Compression
...Show More Authors

Crossref (1)
Crossref