Preferred Language
Articles
/
jcofarts-1075
The Cultural Identity in David Gentelman’s Works
...Show More Authors

The study of cultural identity and its data in the designer’s work is considered a cultural nature to highlight the cultural identity and link it to the national culture of their country and society. It provides a reflection and translation of the society’s culture, traditions, social and economic dimensions, the natural environment, and scientific phenomena. Within meanings translated into a variety of methods, including expressive and realistic, which defines the designer’s relationship with his society and the national culture of his country and his connection with the civilization of the country.
The research problem came with the following question: What are the data of cultural identity in the work of designer David Gentleman? while the researcher identified four chapters for this study as follows:

The first chapter to clarify the methodological framework of the research, while the second chapter represented the theoretical framework and by two chapters: the first included the concept of cultural identity in graphic design, while the second topic included the diversity of identity in the designer's work, while the third chapter represented the research procedures, and the fourth chapter included the results and conclusions, including:

1. The designer's thought is formed from the cultural identity of his country and society, and therefore the designer has an important role in the image of his design product of the character.
2. The religious identity had a clear impact on the designer's style, which affected the process of artistic production of stamps.
3. The nature of the designer's interaction with his environment, with all its factors, reflects the achievement of an environmental identity (natural) in the character designs.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 06 2013
Journal Name
Journal Of Educational And Psychological Researches
رؤية وانموذج- مقترح للارشاد النفسي والتوجيه التربوي في ظل نظام ادارة الجودة الشاملة
...Show More Authors

The global challenges of contemporary facing societies urge to seek and move to adopt the style conscious in the face of these challenges and work on the investment of human resources and energies humanitarian efficient and effective for the development of the institutional and Management and make it more efficient and effective and meets the requirements and keep pace with global developments , and more aspects of managerial aim is Total Quality Management , as it has become thanks to the sheer amount and large accelerated technical developments and information and communication technologies , which feature of this era , and in the field of education , the charge of it are seeking through the application of total quality management to b

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Assessment of Air Pollution around Durra Refinery (Baghdad) from Emission NO2 Gas at April Month
...Show More Authors

Nitrogen dioxide NO2 is one of the most dangerous contaminant in the air, its toxic gas that cause disturbing respiratory effects, most of it emitted from industrial sources especially from the stack of power plants and oil refineries. In this study Gaussian equations modelled by Matlab program to state the effect of pollutant NO2 gas on area around Durra refinery, this program also evaluate some elements such as wind and stability and its effect on stacks height. Data used in this study is the amount of fuel oil and fuel gas burn inside refinery at a year 2017. Hourly April month data chosen as a case study because it’s unsteady month. After evaluate emission rate of the all fuel and calculate exit velocity from

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Apr 11 2023
Journal Name
Indonesian Journal Of Chemistry
Synthesis of Co (ll), Ni (ll), Cu (ll), Pd (ll), and Pt (lV) Complexes with 14, 15, 34, 35-Tetrahydro-11 H, 31 H-4, 8-diaza-1,3 (3,4)-ditriazola-2,6 (1,4)-dibenzenacyclooctaphane-4,7-dien-15, 35-dithione, and the Thermal Stability of Polyvinyl Chloride Modified Complexes
...Show More Authors

In the current endeavor, a new Schiff base of 14,15,34,35-tetrahydro-11H,31H-4,8-diaza-1,3(3,4)-ditriazola-2,6(1,4)-dibenzenacyclooctaphane-4,7-dien-15,35-dithione was synthesized. The new symmetrical Schiff base (Q) was employed as a ligand to produce new complexes comprising Co(II), Ni(II), Cu(II), Pd(II), and Pt(II) metal-ions at a ratio of 2:1 (Metal:ligand). There have been new ligands and their complexes validated by (FTIR), (UV-visible), 1H-NMR, 13C-NMR, CHNS, and FAA spectroscopy, Thermogravimetric analysis (TG), Molar conductivity, and Magnetic susceptibility. The photostabilization technique to enhance the polymer was also used. The ligand Q and its complexes were mixed in 0.5% w/w of polyvinyl chloride in tetrahydrofuran

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2023
Journal Name
Alustath Journal For Human And Social Sciences
كاریگەری ستراتیژییەتی بەستن و ڕاكێشان لەسەر دەسكەوتی فێرخوازانی پۆلی هەشتەمی بنەڕەتی له بابەتی زمان و ئەدەبی كوردیدا/ اثر استراتيجية الشد والجذب في تحصيل طلاب الصف الثامن الاساسي في مادة اللغة والادب
...Show More Authors

Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
An Optimised Method for Fetching and Transforming Survey Data based on SQL and R Programming Language
...Show More Authors

The development of information systems in recent years has contributed to various methods of gathering information to evaluate IS performance. The most common approach used to collect information is called the survey system. This method, however, suffers one major drawback. The decision makers consume considerable time to transform data from survey sheets to analytical programs. As such, this paper proposes a method called ‘survey algorithm based on R programming language’ or SABR, for data transformation from the survey sheets inside R environments by treating the arrangement of data as a relational format. R and Relational data format provide excellent opportunity to manage and analyse the accumulated data. Moreover, a survey syste

... Show More
View Publication Preview PDF
Crossref (1)
Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
New and Existing Approaches Reviewing of Big Data Analysis with Hadoop Tools
...Show More Authors

Everybody is connected with social media like (Facebook, Twitter, LinkedIn, Instagram…etc.) that generate a large quantity of data and which traditional applications are inadequate to process. Social media are regarded as an important platform for sharing information, opinion, and knowledge of many subscribers. These basic media attribute Big data also to many issues, such as data collection, storage, moving, updating, reviewing, posting, scanning, visualization, Data protection, etc. To deal with all these problems, this is a need for an adequate system that not just prepares the details, but also provides meaningful analysis to take advantage of the difficult situations, relevant to business, proper decision, Health, social media, sc

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Compression-based Data Reduction Technique for IoT Sensor Networks
...Show More Authors

Energy savings are very common in IoT sensor networks because IoT sensor nodes operate with their own limited battery. The data transmission in the IoT sensor nodes is very costly and consume much of the energy while the energy usage for data processing is considerably lower. There are several energy-saving strategies and principles, mainly dedicated to reducing the transmission of data. Therefore, with minimizing data transfers in IoT sensor networks, can conserve a considerable amount of energy. In this research, a Compression-Based Data Reduction (CBDR) technique was suggested which works in the level of IoT sensor nodes. The CBDR includes two stages of compression, a lossy SAX Quantization stage which reduces the dynamic range of the

... Show More
View Publication Preview PDF
Scopus (41)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
Prediction Unconfined Compressive Strength for Different Lithology Using Various Wireline Type and Core Data for Southern Iraqi Field
...Show More Authors

Unconfined Compressive Strength is considered the most important parameter of rock strength properties affecting the rock failure criteria.  Various research have developed rock strength for specific lithology to estimate high-accuracy value without a core.  Previous analyses did not account for the formation's numerous lithologies and interbedded layers. The main aim of the present study is to select the suitable correlation to predict the UCS for hole depth of formation without separating the lithology. Furthermore, the second aim is to detect an adequate input parameter among set wireline to determine the UCS by using data of three wells along ten formations (Tanuma, Khasib, Mishrif, Rumaila, Ahmady, Maudud, Nahr Um

... Show More
View Publication Preview PDF
Crossref (2)
Crossref