With a great diversity in the curriculum contemporary monetary and visions, and development that hit the graphic design field, it has become imperative for the workers in the contemporary design research and investigation in accordance with the intellectual treatises and methods of modern criticism, because the work design requires the designer and recipient both know the mechanics of tibographic text analysis in a heavy world of texts and images varied vocabulary and graphics, and designer on before anyone else manages the process of analysis to know what you offer others of shipments visual often of oriented intended from behind, what is meant, in the midst of this world, the curriculum Alsemiae directly overlap with such diverse offerings it best suited for the analysis of what sends the text of the encryption in its structure, which is a comprehensive holistic approach operates with knowledge of modern, contemporary and text Graphic carries in its contents is much that should be studied and searched, that this world is a result, the world of graphic excellence, and the requirements of the current research sounding triggers graphic text Gore according to a method Semiaia clear entrances.
ST Alawi, NA Mustafa, Al-Mustansiriyah Journal of Science, 2013
Language always conveys ideologies that represent an essential aspect of the world we live in. The beliefs and opinions of an individual or community can be organized, interacted with, and negotiated via the use of language. Recent researches have paid attention to bullying as a social issue. They have focused on the psychological aspect of bullying rather than the linguistic one. To bridge this gap, the current study is intended to investigate the ideology of bullying from a critical stylistic perspective. The researchers adopt Jeffries' (2010) critical stylistics model to analyze the data which is five extracts taken from Hunt’s Fish in a Tree (2015). The analysis demonstrates
... Show MoreThe research entitled "The political changes and economic developments in contemporary Turkish Backgrounds, manifestations and future possibilities" consists of the introduction, four sections and conclusions. The background details, its developments, and the transformation in the economic sector in Turkey were reviewed. The first section concentrated on the brief introduction about the political developments which happened since the independence of Turkey at 1923 with the highlight on the years after the receipt of the Freedom and Justice Party (Ak PARTi) the Turkish Government rule. The second section demonstrated the reality of Turkish economy before 2002, while the
... Show MoreArab-Islamic architecture has undergone a change at multiple levels affected by modern technology, so the research sought to address the role of contemporary technologies on a fundamental and fundamental component of architecture, which is the architectural space, what is known as the essence of architecture and its ultimate destination, with a focus on the architectural space in the architecture of the contemporary Arab Islamic mosque, because the mosque’s architecture is so important in Islamic law and the belief of the Muslim person himself, where the mosque is the functional style produced by the Islamic faith and embodied in it, whereas, knowing the levels of influence of contemporary technologies in the architectural spac
... Show MoreExchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreBuilding a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro
... Show Moreحل الاشكالية المنهجية في العلوم الانسانية المنهج البنيوي انموذجاً مقترحاً
In this study, we tackle the understudied area of Artificial Intelligence (AI) and its role in examining how modern revolutions may affect political systems across the Middle Eastern region. despite hundreds of studies documenting Middle Eastern uprisings over the past three decades, there has been little effort to harness AI to better understand or predict these multifaceted events. This study seeks to address this gap by assessing the performance of AI-intelligence in analyzing (broadly) revolutionary processes and their effects on regional political systems. The research uses a mixedmethod methodology that involves a systematic literature review of contemporary scholarly articles, and an analytics study using AI tools. Our results show t
... Show More