The reciprocal relationship between the text and the mask in the printed product is one of the most important relationships that frame the level of communication between the appearance and the interior, although it is not cared for by some designers and publishing institutions. Therefore, the problem of research is determined by the following question (What is the dialectical relationship between the text and the mask in the literary books covers design?). The research aims to shed light on this problematic relationship at the level of reception and aesthetics at the same moment. The theoretical framework included two sections: the first (mask and text ... the concept and the mutual relationship), while the second section (trends in the book covers design).
The sample of the study was determined by four samples of literary book covers issued by the House of Public Cultural Affairs in Baghdad, which were determined according to the positive approach (content analysis). The extrapolation method of analysis based on the analysis foundations that represent the research tool. The researcher, after the completion of the analysis, reached a number of results, the most important of which was: The designer tried to find approaches between the mask and the text. However, this attempt remained far from direct verification and understanding because it did not go deep in the translation of the text or text content, as in the sample number (4). The research ends with some conclusions reached at and an abstract in English.
During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreThis study examines the validity of e-poetry as an acceptable literary genre. The
thematic, stylistic and esthetic features of a selected number of e-poems produced by
poetry generators are analyzed for this purpose. The e-poems are then compared with a
number of works written by Dada poets in order to establish the literary merit of the
former.
Abstract
The current research aims to identify the level of partnership between school and community agencies to improve secondary school outcomes for students with intellectual disabilities and develop strategies that help enhance community partnerships between schools and agencies. The researcher used the qualitative research approach; he utilized the interviews as a tool for data collection. The sample of research included (12) participants: three female school leaders, three male-school leaders, three female-school supervisors, and three male-school supervisors in schools that have programs for students with intellectual disabilities in Riyadh. The results of the study showed that the level of partnership bet
... Show MoreThe splicing design of the existing road and the new road in the expansion project is an important part of the design work. Based on the analysis of the characteristics and the load effect of pavement structure on splicing, this paper points out that tensile crack or shear failure may occur at the splicing under the repeated action of the traffic load on the new/old pavement. According to the current structure design code of asphalt pavement in China, it is proposed that the horizontal tensile stress at the bottom of the splicing layer and the vertical shear stress at other layers of the splicing line should be controlled by adjusting the position and size of the excavated steps in addition to the conventional design ind
... Show MoreIn this paper, the process of comparison between the tree regression model and the negative binomial regression. As these models included two types of statistical methods represented by the first type "non parameter statistic" which is the tree regression that aims to divide the data set into subgroups, and the second type is the "parameter statistic" of negative binomial regression, which is usually used when dealing with medical data, especially when dealing with large sample sizes. Comparison of these methods according to the average mean squares error (MSE) and using the simulation of the experiment and taking different sample
... Show MoreAbstract
This research aims to improve the provided health service level inside Baghdad hospitals and the Yarmouk educational, as well as to shed light on the reality of the health service and the quality within the major operations room in both hospitals, as the operations room represent the research community, as was the use of some quality tools Pareto and Ishikawa diagram to measure and assess the level of quality provided, and include research problem to find out what are the problems and obstacles facing the process of improving quality in both hospitals, and whether there are scientifically accurate method to assess the quality of health service in Baghdad's Yarmouk hospital and educational . Where the researcher h
... Show MoreThe sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.