Preferred Language
Articles
/
jcofarts-122
The problem of overlapping concepts in the interpretive practices of literary text (The texts of Shakespeare model)
...Show More Authors

The scientific studies that deal with Herminutia (interpretation) as the art of reading the interpretation practiced by the recipient after his understanding of the literary texts and works of art that he sees or read them so that these readings to make the act of reading and allow him the opportunity to mature and rational reflection of each text or artistic work.

Based on this, the researchers considered the establishment of the problem of their research through the search for the problematic overlap of concepts in the interpretive practices of the literary text?

The second chapter dealt with the definition of the term interpretation as well as interpretation as a theory and concept, and then the indicators reached by the research, while the chapter The third of the research procedures and identification of the community and the sample, represented by the literary texts of the writer William Shakespeare, and the results and conclusions reached by the researchers were shown with the list of sources and literature.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 05 2016
Journal Name
Al-academy
The Employment of Brainstorming in developing the idea of design of Fine Arts Institute Students in Designing the Technical Advertisement
...Show More Authors

Brainstorming is considered as one of the manners that develop learners' mental abilities. Besides, it can help learners get a lot of ideas and thoughts. And by following applied steps to answer the problem concerned, the researcher carried out this practical study aimed at:Developing the ideas of design of third year students/Institute of Fine Arts/Evening Studies- Baghdad/First Rusafa by employing Brainstorming mechanism to develop the ideas of design of institute students in designing the technical advertisement and to achieve the authenticity of the goal of the research, Department of Plastic Arts/Institute of Fine Arts/Evening Studies/Baghdad-First Rusafa was chosen as a case study for the research. It embraced (20) students who rep

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 28 2021
Journal Name
Misan Journal For Physical Education Sciences
The Effectiveness of Using Generative Learning Model in Learning Kinetic Series on Rings and Horizontal Bar In Artistic Gymnastics for men
...Show More Authors

The aim of this study was to identify the effectiveness of using generative learning model in learning kinetic series on rings and horizontal bar in artistic gymnastics for men ,Also, the two groups were better in learning the two series of movements on the rings and horizontal bar . The experimental method was used to design two parallel groups with pretested and posttest .The sample included third graders at the College of Physical Education and Sports Sciences - University of Baghdad ,The third class (d) was chosen to represent the control group that applied the curriculum in the college, with (12) students per group. After conducting the tribal tests, the main experiment was carried out for (8) weeks at the rate of two units per week di

... Show More
Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
The economic feasibility of substituting different residues replaces part of the barley In the fattening of the Arabian lambs
...Show More Authors

This experiment was carried out at the Grdarash field belongs to the Agricultural researches directorate/general Agriculture directorate-Erbil in September (2007)، 27 Arabic lambs aged (5-6 months) With average initial weight (39.178 Kg/lamb) were used. Lambs were divided in to (3) groups (9 lambs/group). Control group was fed on (85% barely، 10% bran and 5% straw)، and second and third groups were fed on various by-product in replacement with barely in loss and block shape respectively.

The total gain of three groups were (392708.32، 634826.52 & 445613.72 ID resp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Mon Jan 08 2024
Journal Name
Al-academy
Medea Euripides between text and contemporary theatrical presentation
...Show More Authors

It is not available for us to go back in time and see plays old and it plays giants tragedy ancient Greek (Aeschylus, Sofokls, and yourbedes) through the eyes of a generation ago, and if we were able to go back to Ntegathm play it is certain that we will not taste or Nstassig for much of what we see from these offers will not afford the traditional religious rituals, which was accompanied also dance and music in the style of ancient Greek play was representing a large part of the theater see manifestations Can our eyes and ears we twentieth century audience to accept those appearances, and it was then?
Inevitably it will look like a museum bycollection not only. So we find ourselves in the light of the foregoing forced When you do rem

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effect of the Alternative Evaluation Strategy on the Achievement of Fourth-Grade Female Science Students in the Subject of Biology
...Show More Authors

Abstract

The aim of the current research is to identify the Effect of the alternative evaluation strategy on the achievement of fourth-grade female students in the subject of biology. The researchers adopted the zero hypothesis to prove the research objectives, which is there is no statistically significant difference at the level (0.05) between the average scores of the experimental group who study according to the alternative evaluation strategy and the average scores of the control group who study in accordance with the traditional method. The researchers selected the experimental partial adjustment design of the experimental and control groups with the post-test. The researchers intentionally selected (Al-fed

... Show More
View Publication Preview PDF