Preferred Language
Articles
/
jcofarts-1133
The Written Text in Conceptual Art (An Analytical Study)
...Show More Authors

The tagged research problem (the outputs of the written text in conceptual art) dealt with a comparative analytical study in the concept of conceptual art trends (land art - body art - art - language).

The study consisted of four chapters. The first chapter dealt with the theoretical framework, which was represented in presenting (the research problem), which raised the following question: What is the role of the written text in the transformations of the conceptual arts?

The first chapter included (the importance of research) and (research objectives) seeking to conduct comparative research in the written text within the trends of conceptual art as a moving phenomenon in art, and to reveal the variable written text in the trends of conceptual art. As for the limits of the research, it focused on studying the concept of the written text in the works of conceptual art trends and their outputs, by analyzing their illustrated works from the period 2002-2013 in Europe and America. The chapter also included (defining terms) The second chapter: which is represented by the theoretical framework, contains two topics: The second chapter: which is represented by the theoretical framework, contains two topics:

The first topic: an introduction to the concept of writing in the visual field. Conceptual art also dealt with the cognitive and artistic root. As for the second topic, it included: the written text in conceptual art

The third chapter (procedural framework): is concerned with research procedures, defining the research community and selecting the research sample from it, the number of which is (5) models, from the directions of conceptual art, then the research tool and sample analysis.
The fourth chapter: includes the results of the analysis of samples for each direction, then the results of the comparative analysis, conclusions, recommendations and proposals, and a list of sources and translation of the research summary in English.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 14 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Monitoring Indicators for Maternal, Newborn and Child Health at Sub Primary Health Care Centers in Baghdad City: An Evaluative Study
...Show More Authors

Objectives: The study aims to evaluate the application of monitoring indicators for maternal, newborn and
child health through the evaluation of impact and coverage health indicators and to evaluate the usefulness of the
application of these indicators at sub primary health care centers in Baghdad City.
Methodology: A descriptive comparative design, which is using the evaluation approach, has been steered at
Sub Primary Health Centers of Baghdad City in order to evaluate the application; impact and coverage, and the
usefulness of monitoring indicators for maternal, newborn and child health from December 4th 2017 to April 29th
2018. A multistage, "non-probability" convenient, sample is selected for the present study. A t

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (15)
Crossref (4)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2004
Journal Name
Al-academy
فسيفساء قبة الصخرة دراسة تحليلية
...Show More Authors

فسيفساء قبة الصخرة دراسة تحليلية

View Publication Preview PDF
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Experimental Study of Mixed Convection in an Enclosure with a Cold Movable Top Wall and Hot Bottom Wall
...Show More Authors

 

Mixed convection heat transfer to air inside an enclosure is investigated experimentally. The bottom wall of the enclosure is maintained at higher temperature than that of the top wall which keeps in oscillation motion, whereas the left and right walls are well insulated. The differential temperature of the bottom and top walls changed several times in order to accurately characterize the temperature distribution over a considerable range of Richardson number. Adjustable aspect ratio box was built as a test rig to determine the effects of Richardson number and aspect ratio on the flow behavior of the air inside the enclosure. The flow fields and the average Nusselt number profiles were presented in this wo

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 06 2019
Journal Name
Journal Of The College Of Education For Women
The Effect use of the Internet in Academic Libraries A Case Study
...Show More Authors

The aim of this research is to show the importance of the effective use
of the internet in academic libraries; to improve the services and to increase
the competence of librarians.
The research has given some recommendations to improve the quality
of services and the need for cooperative network among academic libraries.

View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
A comparative Study to calculate the Runs Property in the encryption systems
...Show More Authors

Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis

... Show More
View Publication Preview PDF