Preferred Language
Articles
/
jcofarts-14
The Use of Light Text in Arab TV Shows (The Voice TV Program) -A Model
...Show More Authors

The research tackles an important subject, namely, the light text and how it works well in the Arab television programs. The methodological framework of the research     presents the research problem stated in the following question: How can the text be used and what is its impact in the Arab TV programs? The importance of this research is that it deals with the subject of light text and its impact on Arab television programs.

This study is useful to the workers and scholars in the field of lighting as well as the goal of the research in (studying of the employment of light text in Arab television programs).

The limits of research were manifested in the study of the light text and how to make use of it in Arab television programs, including an analysis of the sample which is "The Voices" produced in 2012.

The theoretical framework was divided into two main sections the first was entitled (light: concept and work) in which the researcher discussed the most important scientific and philosophical theories that dealt with this subject in addition to the types of lighting and how to make use of them. The second topic was entitled (the interactive programs).

The researcher pointed out the importance of these programs and how to implement them especially lighting which plays a major role in the construction of these programs. The researcher, after discussing these two sections, came up with a number of theoretical framework indicators that were submitted to a number of experts and arbitrators in order to make them resemble a unit of measurement for the implementation of the analysis.

The researcher, in the research procedures, clarified his choice of the descriptive method   in the analysis of the sample being the closest to the field of his specialization in addition to the analysis tool that was referred to and then the unit of analysis, which was summarized by the screenshot as a basic unit in the analysis of the sample (The Voice). The researcher came up with a number of results, conclusions, recommendations and proposals and then concluded his research with a list of sources and references

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Engineering And Technology Journal
Genetic Based Optimization Models for Enhancing Multi- Document Text Summarization
...Show More Authors

View Publication
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jan 19 2019
Journal Name
Artificial Intelligence Review
Survey on supervised machine learning techniques for automatic text classification
...Show More Authors

View Publication
Scopus (297)
Crossref (269)
Scopus Clarivate Crossref
Publication Date
Wed Jan 10 2018
Journal Name
Al–bahith Al–a'alami
Using of digital media and its effect on constructing the value system of Iraqi society (Field study on a sample of the audience for the city of Baghdad model)
...Show More Authors

With the great development in the field of the Internet, the talk about the new media and its implications began, And its interactive services have made the future of media material sometimes participating in it and manufacturing it at other times,
the public is seeking information and choosing the appropriate ones, as well as exchanging messages with the sender after what the role of the receiver is just receiving information only.
This study aims to demonstrate the effects of using digital media in various forms and types to construct the value system of Iraqi society through the identification of the following aims:
Identify the most popular digital media for the Iraqi public in their daily lives on the Internet.
Identify

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Application of the excess cash margin model (ECM) to detect the Earning Management in the banking sector: Comparative study between commercial and Islamic banks
...Show More Authors

 

The research draws its importance from identifying the methods of profit management in misleading the financial statements, which in turn is reflected in the decisions of the authorities that relied on these reports, and then the models that help in detecting those methods used by the auditors. Risks. The index (margin of excess cash) was used to detect profit management practices on a group of banks listed in the Iraqi market for securities and the number of (23) banks, including (12) commercial bank and (11) Islamic bank and the results were compared to commercial banks with Islamic banks.((The research started from the hypothesis that the use of the (excess cash margin) model in the banking sector reveals the management

... Show More
View Publication Preview PDF
Publication Date
Tue May 16 2023
Journal Name
Political Sciences Journal
Institutional Reality Construction: Principles of its Construction and Functions of Language in its Production; Diplomacy as a Model
...Show More Authors

This study aims to answer a significant problem of social sciences and philosophy: How do we construct an institutional reality such as diplomacy with an objective recognizable existence? The study assumes that the ability to build institutional reality is based on our biological capacity, as it takes different forms in all the institutions we construct. The study takes the theory of the American philosopher John Searle as an approach to examining the assumption. The study sums up important findings; cultures, although they share the biological capacity on which they produce institutional realities, differ in the form of the value standards on which the institutional realities are based. The study recommends the need of Arab social resea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 05 2023
Journal Name
International Journal Of Building Pathology And Adaptation
Adaptation re-use of traditional cafés in Erbil, Iraq
...Show More Authors
Purpose

This paper aims to shed light on adaptive reuse in traditional architecture (TA) in Erbil, Iraq.

Design/methodology/approach

An inductive approach and qualitative method were used in this study. The inductive research approach was used because there was no clear image of adaptive reuse in traditional cafés (TCs) in Erbil. Besides, there are no studies of TCs in Erbil particularly. Thus, there is a lack of knowledge about what adaptations took place in TCs in Erbil. The qualitative method extracted themes and issues from case studies of four TCs in Erbil citadel'

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Oct 24 2022
Journal Name
Plant Archives
USE OF APRICOT KERNELS PROTEIN ISOLATE IN BURGER INDUSTRY
...Show More Authors

The current study was conducted with the aim of fortifying meat burger with the protein isolate extracted from defatted sweetened and unsweetened apricot kernels. The antimicrobial activity of defatted apricot kernels and protein isolates of sweetened and unsweetened kernels against some pathogenic microbes was studied, and it was characterized by its effect on gram-positive bacteria more than gram-negative bacteria. As for its effect on yeast, the inhibition diameter was 4.5 mm at a concentration of 200 mg for the unsweetened protein isolate. As for its effect on mold, the inhibition percentage was between 56.05 65.21% for all samples at a concentration of 100 mg. The sweetened and unsweetened protein isolate was used in the manufact

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Jun 20 2023
Journal Name
مجلة كلية التربية للبنات – الجامعة العراقية ،ت
Use of collocant food items in Arabic and English
...Show More Authors

This paper investigates the collocational use of irreversible food binomials in the lexicons of English (UK) and Arabic (Iraq), their word-order motivations, cultural background, and how they compare. Data consisted in sixteen pairs in English, versus fifteen in Arabic. Data analysis has shown their word order is largely motivated by logical sequencing of precedence; the semantically bigger or better item comes first and the phonologically longer word goes last. These apply in a cline of decreasing functionality: logical form first, semantic importance second, phonological form last. In competition, the member higher in this cline wins first membership. While the entries in each list clearly reflect culturally preferred food meals in the UK

... Show More