Preferred Language
Articles
/
jcofarts-1036
The semiotic approach in analyzing contemporary graphic text
...Show More Authors

With a great diversity in the curriculum contemporary monetary and visions, and development that hit the graphic design field, it has become imperative for the workers in the contemporary design research and investigation in accordance with the intellectual treatises and methods of modern criticism, because the work design requires the designer and recipient both know the mechanics of tibographic text analysis in a heavy world of texts and images varied vocabulary and graphics, and designer on before anyone else manages the process of analysis to know what you offer others of shipments visual often of oriented intended from behind, what is meant, in the midst of this world, the curriculum Alsemiae directly overlap with such diverse offerings it best suited for the analysis of what sends the text of the encryption in its structure, which is a comprehensive holistic approach operates with knowledge of modern, contemporary and text Graphic carries in its contents is much that should be studied and searched, that this world is a result, the world of graphic excellence, and the requirements of the current research sounding triggers graphic text Gore according to a method Semiaia clear entrances.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 19 2019
Journal Name
Artificial Intelligence Review
Survey on supervised machine learning techniques for automatic text classification
...Show More Authors

View Publication
Scopus (300)
Crossref (271)
Scopus Clarivate Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Apr 20 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Text image secret sharing with hiding based on color feature
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Engineering And Technology Journal
Genetic Based Optimization Models for Enhancing Multi- Document Text Summarization
...Show More Authors

View Publication
Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
رواية بوهيميا الخراب دراسة تأويلية في جدلية النص والزمن
...Show More Authors

Bohemia AL-Kharab for Salah Salah Which contain 477Paper deal With History of Nathion This Novel Has a different styl from another IraQis Novels, this Novel has no conversation this is the basic reason Which hav this research .

The novel have 3 versions , the first one deal with explain the text in different ways , the second contains the realation ship between the text and the reader .

Which appear very clear in novel from up to down , whil the third one and the last explaine

The hermonologiq

The time bylose the relation in the novel.

The last thing is the conclusion which has the simple things  conclude by the researcher from several readings  to the novel

 

 <

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 27 2020
Journal Name
Arab Science Heritage Journal
تعالق النص القرآني في شعر كعب بن مالك الأنصاري
...Show More Authors

     The Qur'an was revealed with a clear Arabic tongue, and it seized minds, and was astonished by its eloquence and eloquence of tastes, so it was a new dawn, and a nucleus for the birth of a new literature inspired by the tolerant thought of Islam, its fresh words, and its delicate and revealing meanings

View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The effect of story- grammar instruction on poor college student s 'achievement of narrative texst theme identification
...Show More Authors

0

View Publication Preview PDF
Publication Date
Sun May 10 2020
Journal Name
Baghdad Science Journal
In Silico Analysis of Regulatory Elements of the Vitamin D Receptor
...Show More Authors

Vitamin D receptor (VDR) is a nuclear transcription factor that controls gene expression. Its impaired expression was found to be related to different diseases. VDR also acts as a regulator of different pathways including differentiation, inflammation, calcium and phosphate absorption, etc. but there is no sufficient knowledge about the regulation of the gene itself. Therefore, a better understanding of the genetic and epigenetic factors regulating the VDR may facilitate the improvement of strategies for the prevention and treatment of diseases associated with dysregulation of VDR. In the present investigation, a set of databases and methods were used to identify putative functional elements in the VDR locus. Histone modifications, CpG I

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref