Preferred Language
Articles
/
jcofarts-1075
The Cultural Identity in David Gentelman’s Works
...Show More Authors

The study of cultural identity and its data in the designer’s work is considered a cultural nature to highlight the cultural identity and link it to the national culture of their country and society. It provides a reflection and translation of the society’s culture, traditions, social and economic dimensions, the natural environment, and scientific phenomena. Within meanings translated into a variety of methods, including expressive and realistic, which defines the designer’s relationship with his society and the national culture of his country and his connection with the civilization of the country.
The research problem came with the following question: What are the data of cultural identity in the work of designer David Gentleman? while the researcher identified four chapters for this study as follows:

The first chapter to clarify the methodological framework of the research, while the second chapter represented the theoretical framework and by two chapters: the first included the concept of cultural identity in graphic design, while the second topic included the diversity of identity in the designer's work, while the third chapter represented the research procedures, and the fourth chapter included the results and conclusions, including:

1. The designer's thought is formed from the cultural identity of his country and society, and therefore the designer has an important role in the image of his design product of the character.
2. The religious identity had a clear impact on the designer's style, which affected the process of artistic production of stamps.
3. The nature of the designer's interaction with his environment, with all its factors, reflects the achievement of an environmental identity (natural) in the character designs.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
An Energy-Aware and Load-balancing Routing scheme for Wireless Sensor Networks
...Show More Authors

<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In

... Show More
View Publication Preview PDF
Scopus (26)
Crossref (11)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Perceptually Important Points-Based Data Aggregation Method for Wireless Sensor Networks
...Show More Authors

The transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the

... Show More
View Publication Preview PDF
Scopus (45)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Proposed Security Models for Node-level and Network-level Aspects of Wireless Sensor Networks Using Machine Learning Techniques
...Show More Authors

     As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Dec 25 2009
Journal Name
Wireless Personal Communications
A N-Radon Based OFDM Trasceivers Design and Performance Simulation Over Different Channel Models
...Show More Authors

In this paper a new method is proposed to perform the N-Radon orthogonal frequency division multiplexing (OFDM), which are equivalent to 4-quadrature amplitude modulation (QAM), 16-QAM, 64-QAM, 256-QAM, ... etc. in spectral efficiency. This non conventional method is proposed in order to reduce the constellation energy and increase spectral efficiency. The proposed method gives a significant improvement in Bit Error Rate performance, and keeps bandwidth efficiency and spectrum shape as good as conventional Fast Fourier Transform based OFDM. The new structure was tested and compared with conventional OFDM for Additive White Gaussian Noise, flat, and multi-path selective fading channels. Simulation tests were generated for different channels

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Intrusion Detection System Using Data Stream Classification
...Show More Authors

Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 02 2021
Journal Name
جامعة واسط مجلة كلية التربية
استعمال الانموذج اللوجستي ثنائي المعلم في بناء وتدريج مقياس الشخصية الافتراضية المتعدد الابعاد لطلبة الجامعة وفقا لنظرية الاستجابة للفقرة
...Show More Authors

تهدف الدراسة الحالية الى استعمال الانموذج اللوجستي ثنائي المعلم في تدريج مقياس الشخصية الافتراضية المتعدد الابعاد لطلبة الجامعة وفقا لنظرية الاستجابة للفقرة، والخروج بتعميم لنتائج البحث والوقوف على الاجراءات العلمية المناسبة وتوفير تطبيق عملي علمي صحيح لاعتمادها من قبل الباحثين. وقد اتبعث الباحثة الاسلوب العلمي من خطوات واجراءات في عملية بناء المقياس حيث حدت ابعاد الشخصية الافتراضية المتمثلة بسبع ابعا

... Show More
View Publication
Publication Date
Sun Jan 19 2025
Journal Name
Kufa Journal Physical Education Sciences
اثر تدريبات بأسلوب التدريب الدائري لبناء التحمل في تطوير بعض القدرات الحركية لأشبال لكرة القدم بأعمار (13- 15) سنة
...Show More Authors

اهمية البحث هي مرحلة نمو وبناء اجهزة الجسم للاعبين الاشبال واعداد تدريبات بأسلوب التدريب الدائري لبناء التحمل لتطوير بعض القدرات الحركية والمهارية لدى اللاعبين الاشبال بكرة القدم , حيث لاحظت الباحثة ضعف في مستوى الاداء الحركي ارتأت اعداداً بدنيا ومهارياً منذ مرحلة البناء الأولى للاعب الفئات العمرية , واستخدم الباحث المنهج التجريبي بالاختبار القبلي والبعدي للمجموعتين التجريبية والضابطة لملائمته لطبيعة ال

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 04 2023
Journal Name
Baghdad Science Journal
Nordhaus-Gaddum Type Relations on Open Support Independence Number of Some Path Related Graphs Under Addition and Multiplication
...Show More Authors

In this paper, Nordhaus-Gaddum type relations on open support independence number of some derived graphs of path related graphs under addition and multiplication are studied.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Jul 06 2014
Journal Name
Journal Of Educational And Psychological Researches
أصول التربية : تضارب المحتوى وإشكالية الإعداد دراسة نقدية لكتب ومقررات أصول التربية في الجامعات العربية ووضع تصور منهاجي بديل
...Show More Authors

Research questions  start from the fact that what the Arab origins of education  indicted . First question are :

- To what extent the subject of assets acquired a specific meaning in the Arabic books and educational subjects ? Is these selections are reflected on the classification of assets and their types ?
- What’s the nature of the content ? .Is there a consistency between the meaning and content ?

- What entrances handling and curriculum approach and tactics are in those books ?

- Is the assets subject introduced within  the grade  best suited ?

         &nb

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
الإبلاغ المالي عن المشتقات المالية بوصفها أدوات للتحوط من المخاطر السوقية وفقاً للمعايير المحاسبية الدولية: بالتطبيق في مصرف بغـداد
...Show More Authors

The research has  focused on accounting for marketing risks faced by banks because they are exposed to a high level of risk as a result of their great utilization of financial instruments, which may make them liable to insolvency or bankruptcy and collapse, and accordingly to major economic crises. Therefore, banks are required to manage (reduce) risks so as to prevent them. As Iraqi banks don't manage these risks according to modern methodology of using derivatives, as well as lack of both the standard accounting system for banks and the Iraqi accounting criterion (standard) No. 10 to an obvious methodology for these risks identification, classification, hedging and disclosure, the researchers was prompted to concentrate

... Show More
View Publication Preview PDF