The present research aims at revealing the advertising image semiotics in the American printed poster by following the image's significance and its transformations through the poster design trends and indicating its nature whether it is an explicit or implicit image. The limits of the research were the American printed poster during 2016-2018 period. The theoretical side was determined by two sections, the first: (the advertising image semiotics) and the second (design trends in the printed poster). The research procedures were represented by the research method adopted in the analysis of the sample models identified in four models taken from the research community which contains (24) models. The selection was made according to the trend and type of the mark and then analyzed according to a research tool whose paragraphs were bases taken from the theoretical framework. After analyzing the models that represent the research sample, the researcher reached at a set of results and conclusions and the most prominent of these were that ( the designers aimed at topics devoted in the collective memory such as the pigeon, olive branch, umbrella and freedom statute as part of the act of communication and the communication theory which the designer does not find difficult to convey), in accordance with the subject of his research in light of the focus on the advertising image based on the mark logic and his analysis of the semiotics of that image.
The issue of image captioning, which comprises automatic text generation to understand an image’s visual information, has become feasible with the developments in object recognition and image classification. Deep learning has received much interest from the scientific community and can be very useful in real-world applications. The proposed image captioning approach involves the use of Convolution Neural Network (CNN) pre-trained models combined with Long Short Term Memory (LSTM) to generate image captions. The process includes two stages. The first stage entails training the CNN-LSTM models using baseline hyper-parameters and the second stage encompasses training CNN-LSTM models by optimizing and adjusting the hyper-parameters of
... Show MoreImage compression is a serious issue in computer storage and transmission, that simply makes efficient use of redundancy embedded within an image itself; in addition, it may exploit human vision or perception limitations to reduce the imperceivable information Polynomial coding is a modern image compression technique based on modelling concept to remove the spatial redundancy embedded within the image effectively that composed of two parts, the mathematical model and the residual. In this paper, two stages proposed technqies adopted, that starts by utilizing the lossy predictor model along with multiresolution base and thresholding techniques corresponding to first stage. Latter by incorporating the near lossless com
... Show MoreImage classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class
... Show MoreAbstract The goal of current study was to identify the relationship between addiction of self-images (Selfie) and personality disorder of narcissus, and the difference of significance the relationship between addiction self-images (selfie) and personality disorder narcissus at students of Mustansiriya university, addiction self- images (selfie) defined: a photograph that one has taken of oneself, typically one taken with a smartphone or webcam and shared via social media, edit and down lowed to social networking sites, and over time, the replacement of normal life virtual world, which is accompanied by a lack of a sense of time, and the formation of repeated patterns increase the risk of social and personal problems. To achieve the goals
... Show MoreAbstract
Metal cutting processes still represent the largest class of manufacturing operations. Turning is the most commonly employed material removal process. This research focuses on analysis of the thermal field of the oblique machining process. Finite element method (FEM) software DEFORM 3D V10.2 was used together with experimental work carried out using infrared image equipment, which include both hardware and software simulations. The thermal experiments are conducted with AA6063-T6, using different tool obliquity, cutting speeds and feed rates. The results show that the temperature relatively decreased when tool obliquity increases at different cutting speeds and feed rates, also it
... Show MoreIslamic Culture face many challenges Such as، Secularism، westrenism، globalism and Colonialism under current attempts For western States and united states of America to dominate on world and Confront all her Opponent Polaris it be clear when U. S. A. Occupied Afghanistan and Iraq and Threatened many Arabic and Islamic States
Islamic Culture face many challenges Such as، Secularism، westrenism، globalism and Colonialism under current attempts For western States and united states of America to dominate on world and Confront all her Opponent Polaris it be clear when U. S. A. Occupied Afghanistan and Iraq and Threatened many Arabic and Islamic States
In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreThis research had been achieved to identify the image of the subsurface structure representing the Tertiary period in the Galabat Field northeast of Iraq using 2D seismic survey measurements. Synthetic seismograms of the Galabat-3 well were generated in order to identify and pick the reflectors in seismic sections. Structural Images were drawn in the time domain and then converted to the depth domain by using average velocities. Structurally, seismic sections illustrate these reflectors are affected by two reverse faults affected on the Jeribe Formation and the layers below with the increase in the density of the reverse faults in the northern division. The structural maps show Galabat field, which consists of longitudinal Asymmetrical narr
... Show More