Preferred Language
Articles
/
jcofarts-1036
The semiotic approach in analyzing contemporary graphic text
...Show More Authors

With a great diversity in the curriculum contemporary monetary and visions, and development that hit the graphic design field, it has become imperative for the workers in the contemporary design research and investigation in accordance with the intellectual treatises and methods of modern criticism, because the work design requires the designer and recipient both know the mechanics of tibographic text analysis in a heavy world of texts and images varied vocabulary and graphics, and designer on before anyone else manages the process of analysis to know what you offer others of shipments visual often of oriented intended from behind, what is meant, in the midst of this world, the curriculum Alsemiae directly overlap with such diverse offerings it best suited for the analysis of what sends the text of the encryption in its structure, which is a comprehensive holistic approach operates with knowledge of modern, contemporary and text Graphic carries in its contents is much that should be studied and searched, that this world is a result, the world of graphic excellence, and the requirements of the current research sounding triggers graphic text Gore according to a method Semiaia clear entrances.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 21 2022
Journal Name
Journal Of Planner And Development
The effect of technology on achieving contemporary levels in the space of Arab Islamic architecture “Mosques is a case study”
...Show More Authors

Arab-Islamic architecture has undergone a change at multiple levels affected by modern technology, so the research sought to address the role of contemporary technologies on a fundamental and fundamental component of architecture, which is the architectural space, what is known as the essence of architecture and its ultimate destination, with a focus on the architectural space in the architecture of the contemporary Arab Islamic mosque, because the mosque’s architecture is so important in Islamic law and the belief of the Muslim person himself, where the mosque is the functional style produced by the Islamic faith and embodied in it, whereas, knowing the levels of influence of contemporary technologies in the architectural spac

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the reality of the problem of banking stumbling in Rafidain Bank
...Show More Authors

The process of granting loans by banks is the confidence they give to their customers, but this trust should not be a cornerstone in granting loans even if granted these loans on the basis of sound banking should involve risks that may be exposed to the bank because of the failure of the client to meet The bank's financial obligations to the bank due to the unexpected economic conditions affecting the customers, which makes them in a state of faltering, which weaken the ability of banks to provide loans, which are the most important sources of revenue and profits, so the problem of non-performing loans is one of the main problems facing most of the banks Which impede the functioning of its work and the reasons that led to the agg

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Measuring and analyzing the effect of labor productivity and capital on manufacturing industries in Iraq and some Arab countries for the period 1990-2000
...Show More Authors

يلعب القطاع الصناعي التحويلي في أي قطر دوراً هاماً في تحقيق التنمية الصناعية، اذ تتحد تاثيراته فيها على طبيعة الدور المرسوم له وعلى مدى فاعلية هذا القطاع الحيوي الذي يعد اتجاه نحو التعاظم المضطرد لمستويات الانتاجية " Levels of productivity"والتنويع الانتاجي والتدفق المستمر للتجديد التكنولوجي من اهم دلائله.

ويعد مؤشر الانتاجية بصفة عامة وانتاجيتي العمل وراس المال بصفة خاصة من الم

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
(General corruption is an approach to tyrants and unjust in the perspective of the Holy Quran)
...Show More Authors

      That corruption with all its forms,  has prevailed over the whole world, but  with  different degrees relaying on the one who leads these countries of rulers, followers and officials who have been deemed  the main reason for that corruption, but if these  rulers  were righteous, These countries would have blessed and elevated and were corrupt unjust tyrants who were the disaster that befell the chiefs of those countries  with ruin, misery, and backwardness. This is what we sought to prove and clarify by considering the verses of the Holy Qur’an in respect with this topic. The research includes an introduction, two topics, and a conclusion.

   &nbsp

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
A Heuristic Approach to the Consecutive Ones Submatrix Problem
...Show More Authors

Given a matrix, the Consecutive Ones Submatrix (C1S) problem which aims to find the permutation of columns that maximizes the number of columns having together only one block of consecutive ones in each row is considered here. A heuristic approach will be suggested to solve the problem. Also, the Consecutive Blocks Minimization (CBM) problem which is related to the consecutive ones submatrix will be considered. The new procedure is proposed to improve the column insertion approach. Then real world and random matrices from the set covering problem will be evaluated and computational results will be highlighted.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
American Standard Code for Information Interchange mapping technique for text hiding in the RGB and gray images
...Show More Authors

Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (14)
Crossref (4)
Scopus Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF