Preferred Language
Articles
/
jcofarts-50
Integrative Relationship between the Picture and the Written Text in the Commercial Advertisement
...Show More Authors

There is no doubt that the   advertisement picture  and the written text play  a key role in the formation of the language of the communicative discourse as the main pillars of the design of commercial advertising and the main entrance for the  advertising message awareness... Hence the researcher chose the title of her research (Integrative Relationship between the Picture and the Written Text in the Printed Commercial Advertisement) starting from following questions: What is the relationship between the picture and the written text in the printed commercial declaration? Is there functional, aesthetic and interactive integration between them?

                 The importance of the research stems from the possibility of its contribution to the enrichment of the cognitive aspect of the complementarity of the relationship between the picture and the written text in the design of the printed commercial advertisement for the specialists researchers and   workers and those interested in the field of design.

                 The research also aims at revealing the integration of the relationship between the picture and the written text in the design of the printed commercial advertisement.

                The research limits were determined to the study of commercial advertisements of the United States of America published on the Internet in 2016.

               The theoretical framework of the research included the problem of research, its importance, its objectives, and its objective, temporal and spatial limits. The theoretical framework included two sections: the first section is about the concept of complementarity in the typographic achievement.

       The second section dealt with the effectiveness of the relationship between the picture and the written text in the commercial advertisement.  The research procedures and the most important findings and conclusions are then presented. The most important results that have been achieved are as follows:

                1 – The employment of the advertising picture as the main unit that occupies the majority of the advertising space, while the written text explains and supports it, achieving a coherent relationship between the visual and intellectual situation.

                 2 –The presence of words alongside the picture helps in opening the horizons to the thinking of the recipient, especially in the case of words compensation for the inability of the fixed advertisement picture in the expression of temporal or causal links

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 30 2013
Journal Name
College Of Islamic Sciences
هامات The contributions of the Kurdish scholars in the science of the Qur’an in the seventh and eighth Hijri centuries
...Show More Authors

This research sheds light on the contributions of a group of scientific Kurdish scholars in the seventh and eighth Hijri centuries, who devoted themselves to serving science with the bad political and economic conditions at the time, and the research pointed to the flowering of science and how students travel in order to provide them with science, obtain a scientific certificate, then take up The research efforts of the scholars in the two Hijri century mentioned in the science of the Qur’an, whether in the field of recitations, intonation or interpretation, and the research ends with a conclusion in which I mentioned the most important conclusions reached in this research.

View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (15)
Crossref (4)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2017
Journal Name
International Journal Of Science And Research
Analysis of Correlation between Mesiodistal width of the Maxillary and Mandibular Anterior and Posterior Teeth for Both Genders in Iraqi Population
...Show More Authors

Abstract: Choosing suitable artificial teeth for partially edentulous patients and arranging these teeth in a way to look natural is difficult. An important factor in dentures construction is the mesiodistal width of anterior teeth, because a denture would not appearance natural if artificial teeth are of incorrect size. While for a successful orthodontic treatment, mesiodeistal width of teeth is important for space analysis and for establishing proper occlusion. The aim of this study is to determine the correlation between the average mesiodistal width of anterior and posterior teeth in male and female Iraqi population. 40 Iraqi subjects with normal occlusion participated in this study. Mesiodistal measurement of all teeth was carried out

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
The Role of Supervisory and Training Practices in The Field Education Programmes in Achieving the Course Objectivesfrom the Perspective of the Student Teachers in the Faculty of Science and Arts in Sharourah
...Show More Authors

The present study aimed at identifying the role of supervisory and training practices in the field   education program in achieving course objectives from the perspective of the student teachers in the Faculty of Science and Arts in sharourah, and its relationship to some variables (gender, specialization,estimation). To achieve this, the researcher used the descriptive-analytical method, and the study tool was designed, which consists of (24) items distributed on two axes: the objectives of field education and supervisory and training practices.Then, the study tool was applied to the research sample represented in the entire study community, which consists of (65) male and female students in the Faculty of Sciences and Arts in

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 28 2023
Journal Name
Al–bahith Al–a'alami
The Self and the Other in the Dogmatic Discourse: The Cognitive and Emotional Structure of the Authoritarian and Destructive Personality
...Show More Authors

The philosopher and social psychologist Erich Fromm (1900-1980), in his book "Escape from Freedom" highlighted the distinction between the "I" of the authoritarian personality and the "I" of the destructive personality based on their stance towards "the other." The former (the authoritarian self) relies on a submissive, enslaving formula, where the "I" is the master/dominator/controller/strong, while "the other" is the servant/submissive/controlled/weak, essential for perpetuating this formula. In contrast, the latter (the destructive self) relies on an annihilating, negating formula, where the "I" is existence/killer/destroyer/pe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Loqmania commandments in the Koran And its impact in the refinement of the doctrine and morals emerging
...Show More Authors

Luqman's story stated that human instinct, if I was brought up properly, reaches wisdom and inflicts the right to everything. It is to go to worship God and adhere to the satisfaction of morals and high morals that are ordered to meet among human beings in this life, because this worship educates in the soul the most beautiful morals needed by human beings of honesty, honesty and modesty, and the work of good and virtues, and distancing the soul from evil and vices.

View Publication Preview PDF