Preferred Language
Articles
/
jcofarts-1133
The Written Text in Conceptual Art (An Analytical Study)
...Show More Authors

The tagged research problem (the outputs of the written text in conceptual art) dealt with a comparative analytical study in the concept of conceptual art trends (land art - body art - art - language).

The study consisted of four chapters. The first chapter dealt with the theoretical framework, which was represented in presenting (the research problem), which raised the following question: What is the role of the written text in the transformations of the conceptual arts?

The first chapter included (the importance of research) and (research objectives) seeking to conduct comparative research in the written text within the trends of conceptual art as a moving phenomenon in art, and to reveal the variable written text in the trends of conceptual art. As for the limits of the research, it focused on studying the concept of the written text in the works of conceptual art trends and their outputs, by analyzing their illustrated works from the period 2002-2013 in Europe and America. The chapter also included (defining terms) The second chapter: which is represented by the theoretical framework, contains two topics: The second chapter: which is represented by the theoretical framework, contains two topics:

The first topic: an introduction to the concept of writing in the visual field. Conceptual art also dealt with the cognitive and artistic root. As for the second topic, it included: the written text in conceptual art

The third chapter (procedural framework): is concerned with research procedures, defining the research community and selecting the research sample from it, the number of which is (5) models, from the directions of conceptual art, then the research tool and sample analysis.
The fourth chapter: includes the results of the analysis of samples for each direction, then the results of the comparative analysis, conclusions, recommendations and proposals, and a list of sources and translation of the research summary in English.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 11 2019
Journal Name
Al-khwarizmi Engineering Journal
An Investigation Study of Tool Geometry in Single Point Incremental Forming (SPIF) and their effect on Residual Stresses Using ANOVA Model
...Show More Authors

Incremental forming is a flexible sheet metal forming process which is performed by utilizing simple tools to locally deform a sheet of metal along a predefined tool path without using of dies. This work presents the single point incremental forming process for producing pyramid geometry and studies the effect of tool geometry, tool diameter, and spindle speed on the residual stresses. The residual stresses were measured by ORIONRKS 6000 test measuring instrument. This instrument was used with four angles of (0º,15º,30º, and 45º) and the average value of residual stresses was determined, the value of the residual stress in the original blanks was (10.626 MPa). The X-ray diffraction technology was used to measure the residual stresses

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Structural imbalance of Iraqi trade balance for the period (2014_1994)
...Show More Authors

Abstract:

     The use of economic resources enjoyed Iraq by especially oil resources, which constitute the main source of financial revenue, would the economic surplus outside the oil sector increases by mobilizing and rallying the labor power and turn it into an access capitalism, , was the cause of "the inaction of the productive sectors of the economy, made the investment planning process and even investment in human capital was not rationality with the increasing number of unemployed, particularly certificates and specializations high campaign, direction of the government towards market liberalism after 2003 through the, was focused not follow a clear economic policies, and the absence of planning

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
American Standard Code for Information Interchange mapping technique for text hiding in the RGB and gray images
...Show More Authors

Publication Date
Tue Jun 30 2015
Journal Name
College Of Islamic Sciences
The formula is effective in Surat Nisa: (A study of gramophone)
...Show More Authors

The formula is effective in Surat Nisa
(A study of gramophone)

in the name of o Allah the Merciful
Praise be to Allah, Lord of the Worlds, and prayers and peace be upon the Seal of the Prophets and Messengers. The envoy is a mercy to the worlds Muhammad Sadiq Al - Amin and to the pure and good companions of the Tayyibites.
The formula of the morphological formulas, which have diverged from other meanings, whether lexicon or contextual and what this formula contains many meanings (effective source) and (effective in the sense of effective) and (effective sense reactor) and (effective sense) and ( (F) in the sense of a similar character) and ((the name of the) (collect). This was dealt with in the formula in Surat al-Nisaa

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
Al-academy
Style and the jump in industrial product design - a comparative study
...Show More Authors

Find cares studying ways in the development of industrial products and designs: the way the progressive development (how typical) and root development (jump design), was the aim of the research: to determine the effectiveness of the pattern and the jump in the development of designs and industrial products. After a process of analysis of a sample of research and two models of contemporary household electrical appliances, it was reached a set of findings and conclusions including:1-leaping designs changed a lot of entrenched perceptions of the user on how the product works and its use and the size and shape of the product, revealing him about the possibilities of sophisticated relationships with the product, while keeping the typical desi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
Transformation in International Polar System: Study of the future of the nonpolar system
...Show More Authors

The study of the future of the international system currently appears, according to scientific data and existing facts in light of the emergence of international actors from non-states and international informal institutions, to be heading towards a non-polarity system and this trend is fueled by many variables to reduce polarity, and it is expected in the future that the international system will turn into a non-polarity.

 

View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Sun Jan 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Text Classification Based on Weighted Extreme Learning Machine
...Show More Authors

The huge amount of documents in the internet led to the rapid need of text classification (TC). TC is used to organize these text documents. In this research paper, a new model is based on Extreme Machine learning (EML) is used. The proposed model consists of many phases including: preprocessing, feature extraction, Multiple Linear Regression (MLR) and ELM. The basic idea of the proposed model is built upon the calculation of feature weights by using MLR. These feature weights with the extracted features introduced as an input to the ELM that produced weighted Extreme Learning Machine (WELM). The results showed   a great competence of the proposed WELM compared to the ELM. 

View Publication Preview PDF
Crossref (3)
Crossref