Preferred Language
Articles
/
jcofarts-1075
The Cultural Identity in David Gentelman’s Works
...Show More Authors

The study of cultural identity and its data in the designer’s work is considered a cultural nature to highlight the cultural identity and link it to the national culture of their country and society. It provides a reflection and translation of the society’s culture, traditions, social and economic dimensions, the natural environment, and scientific phenomena. Within meanings translated into a variety of methods, including expressive and realistic, which defines the designer’s relationship with his society and the national culture of his country and his connection with the civilization of the country.
The research problem came with the following question: What are the data of cultural identity in the work of designer David Gentleman? while the researcher identified four chapters for this study as follows:

The first chapter to clarify the methodological framework of the research, while the second chapter represented the theoretical framework and by two chapters: the first included the concept of cultural identity in graphic design, while the second topic included the diversity of identity in the designer's work, while the third chapter represented the research procedures, and the fourth chapter included the results and conclusions, including:

1. The designer's thought is formed from the cultural identity of his country and society, and therefore the designer has an important role in the image of his design product of the character.
2. The religious identity had a clear impact on the designer's style, which affected the process of artistic production of stamps.
3. The nature of the designer's interaction with his environment, with all its factors, reflects the achievement of an environmental identity (natural) in the character designs.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
اكليل للدراسات الانسانية
الخطأ المضمر في نطاق المسؤولية الطبيةدراسة معززة بالقرارات القضائية (فرنسا-العراق) انموذجا
...Show More Authors

يقوم الخطأ المضمر على فكرة مبناها استنتاج الخطأ من وقوع الضرر، منشئاً بذلك قرينة قانونية بسيطة للمدعي (المضرور) تعفيه من اثبات خطأ المدعى عليه (المسؤول)، وهذا الافتراض في الاساس فكرة قضائية وجدت لمساعدة المضرور في الحصول على التعويض في حالة عدم تمكنه من تحديد خطأ المسؤول ، الا انه افتراضٌ قابلٌ لإثبات العكس من خلال نفي اي خطأ صادر عن المدعى عليه ، ويمكن نفيه ايضاً بإثبات انقطاع السببية بين الخطأ المضمر والضرر

... Show More
Publication Date
Sun Mar 26 2023
Journal Name
Arab Science Heritage Journal
أمراء البحر في العصر العباسي إلى نهاية القرن الثالث الهجري/ التاسع الميلادي
...Show More Authors

The Abbasid state inherited many enemies because of the Islamic conquests in the Umayyad era and its geographical extension, which included a number of seas, so it had to direct its energy to preserve the achievements achieved by its predecessors from the Muslims. One of the sea princes who had a role in protecting the coasts of the Abbasid state, especially in the Levant and Egypt.

View Publication Preview PDF
Publication Date
Mon Oct 15 2018
Journal Name
Arab Science Heritage Journal
رواد رواد علم الفلك في العصر العباسي أولاد موسى بن شاكر أنموذجاً
...Show More Authors

Is astronomy in the Abbasid era one of the sciences that Muslims developed at that time? The restriction of students at the hands of a large number of students, which increased the development and increase the value of monitoring mechanisms and their outstanding efforts in support and development of the Arab civilization of Islam

View Publication Preview PDF
Publication Date
Sat Dec 03 2022
Journal Name
مجلة تكريت للعلوم السياسية
الوعي الذاتي في الفكر السياسي الليبرالي الحديث( جون لوك، ايمانوئيل كانط انموذجا)
...Show More Authors

أن الوعي الذاتي والمعرفة قد برزت أهميتها في الفكر السياسي الليبرالي الحديث وجاءت من أجل المناداة بأهمية الوعي في جوهر الفرد فقد بين أغلب المفرين وأبرزهم جون لوك وايمانويل كانط، أكد لوك بأن حالة الوعي الذاتي تكتسب بالتجربة من خلال الإحساس والتأمل او التفكير، فالعقل صفحة بيضاء خاوية ولا توجد فيها أفكار فطرية ولكن في نفس الوقت يؤكد على وجود قوة فطرية في العقل وليست أفكار يمكن ان تحول الأفكار البسيطة الى مركبة م

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2024
Journal Name
Iklīl For Humanities Studies
المنفى في شعر الشاعر الاسباني رافائيل البرتي و الشاعر العراقي يحيى السماوي
...Show More Authors

يعد شعر المنفى احد اهم روافد الادب المعاصر فهو يعكس الإبداع الشعري الحقيقي للشاعر المنفي، ويعكس في الوقت ذاته الحنين والألم الذي يعاني منه بسبب البعد عن وطنه. ومن ناحية أخرى، يصور شعر المنفى حالة المقاومة والنضال التي يختزنها الشاعر . نتناول في هذا البحث م وضوع شعر المنفى عند شاعرين منفيين لم يلتقيا في بلد واحد ولم يتبنيا ثقافة فكرية مشتركة, إلا أن الشاعرين تحملا نفس مرارة المنفى التي عبرا عنها بشكل واضح في شعر

... Show More
Publication Date
Fri Dec 01 2023
Journal Name
Chemical Methodologies
Investigations on TiO<inf>2</inf>-NiO@In<inf>2</inf>O<inf>3</inf> Nanocomposite Thin Films (NCTFs) for Gas Sensing: Synthesis, Physical Characterization, and Detection of NO<inf>2</inf> and H<inf>2</inf>S Gas Sensors
...Show More Authors

Scopus (15)
Scopus
Publication Date
Tue Apr 11 2023
Journal Name
Indonesian Journal Of Chemistry
Synthesis of Co (ll), Ni (ll), Cu (ll), Pd (ll), and Pt (lV) Complexes with 14, 15, 34, 35-Tetrahydro-11 H, 31 H-4, 8-diaza-1,3 (3,4)-ditriazola-2,6 (1,4)-dibenzenacyclooctaphane-4,7-dien-15, 35-dithione, and the Thermal Stability of Polyvinyl Chloride Modified Complexes
...Show More Authors

In the current endeavor, a new Schiff base of 14,15,34,35-tetrahydro-11H,31H-4,8-diaza-1,3(3,4)-ditriazola-2,6(1,4)-dibenzenacyclooctaphane-4,7-dien-15,35-dithione was synthesized. The new symmetrical Schiff base (Q) was employed as a ligand to produce new complexes comprising Co(II), Ni(II), Cu(II), Pd(II), and Pt(II) metal-ions at a ratio of 2:1 (Metal:ligand). There have been new ligands and their complexes validated by (FTIR), (UV-visible), 1H-NMR, 13C-NMR, CHNS, and FAA spectroscopy, Thermogravimetric analysis (TG), Molar conductivity, and Magnetic susceptibility. The photostabilization technique to enhance the polymer was also used. The ligand Q and its complexes were mixed in 0.5% w/w of polyvinyl chloride in tetrahydrofuran

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Compression-based Data Reduction Technique for IoT Sensor Networks
...Show More Authors

Energy savings are very common in IoT sensor networks because IoT sensor nodes operate with their own limited battery. The data transmission in the IoT sensor nodes is very costly and consume much of the energy while the energy usage for data processing is considerably lower. There are several energy-saving strategies and principles, mainly dedicated to reducing the transmission of data. Therefore, with minimizing data transfers in IoT sensor networks, can conserve a considerable amount of energy. In this research, a Compression-Based Data Reduction (CBDR) technique was suggested which works in the level of IoT sensor nodes. The CBDR includes two stages of compression, a lossy SAX Quantization stage which reduces the dynamic range of the

... Show More
View Publication Preview PDF
Scopus (41)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref