The reciprocal relationship between the text and the mask in the printed product is one of the most important relationships that frame the level of communication between the appearance and the interior, although it is not cared for by some designers and publishing institutions. Therefore, the problem of research is determined by the following question (What is the dialectical relationship between the text and the mask in the literary books covers design?). The research aims to shed light on this problematic relationship at the level of reception and aesthetics at the same moment. The theoretical framework included two sections: the first (mask and text ... the concept and the mutual relationship), while the second section (trends in the book covers design).
The sample of the study was determined by four samples of literary book covers issued by the House of Public Cultural Affairs in Baghdad, which were determined according to the positive approach (content analysis). The extrapolation method of analysis based on the analysis foundations that represent the research tool. The researcher, after the completion of the analysis, reached a number of results, the most important of which was: The designer tried to find approaches between the mask and the text. However, this attempt remained far from direct verification and understanding because it did not go deep in the translation of the text or text content, as in the sample number (4). The research ends with some conclusions reached at and an abstract in English.
The game of football is one of the most popular games in the world because of its beauty in the hearts of its fans. From this position, the game of five football for people with simple mental disability has become as much attention to many other sporting events, so the researchers believe that the tests of basic skills match the level of individuals tested In terms of their age and mental ability, the technical aspects were adopted as a means of selecting those who are qualified to practice this game in the simplest form, so the importance of the research problem in designing and standardizing two dribbling skating tests for members of this category and It depends by training their cadres during the selection process. The research community
... Show MoreThe five-a- Side Soccer for people with a minor mental disability has become as important as many other sporting events. Therefore, the researcher considers that the basic skills tests are suited to the level of the tested individuals in terms of their age and mental ability. The technical aspects were adopted as a means of selecting from They are qualified to practice this game in the simplest form, so show the importance of the problem of research through the design and codification of two tests of handling skills belonging to this category and adopted by the training cadres during the selection process. The research community for people with minor mental disabilities determines the male category of the mental and social disability instit
... Show MoreThis study examines strategies of cultural domestication in Muravyov and Kistyakovsky’s Russian translation of (The Fellowship of the Ring). It documents transformations of character names, toponyms, dialogues, and cultural references, highlighting systematic Russification and the infusion of Soviet political commentary that reshape the text into cultural rewriting.
Feature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall
... Show MoreSingled current study on the subject of shorthand in structure designs logos (Iraqi sports clubs model), as the current study Tdmt four chapters, was in the first chapter defines the research problem and its significance, as well as the aim of the research in the know shorthand formal in structure designs logos (Iraqi sports clubs model ), and identifies Find time limits: - slogans Iraqi sports clubs for the years (1956 - 1970), because it represented the years to include designs slogans official Iraqi sports clubs that have been elected in this period for the purpose of examining the reality of the design in the current search. And it represented the spatial limits: - the Republic of Iraq - Iraqi slogans designs sports
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show Moreالضاد والظاء موطن تفرد العربية وفخرها ، الفت فيهما العشرات والعشرات من المصنفات الثرّة لكثرة ذرائع تلابسهما والخلط بينهما ، فهما متشابهان في هيكل البناء ، وإخراجهما متداخل على اللسان ، وألفاظهما متناظرة برحابة في الإملاء ، فضلاعن اشكالهما إلى حدّ الآن ، مما حثني على التفكير في وسائل تسهل المطروح وتمد جسراً بين أجزائه عسى أن تدنو قطافه في دفع الشبهة ومواراتها ، فتحصلت لي امور ادرتها بكلمتين مف
... Show More