Preferred Language
Articles
/
jcois-1247
Technical image sources In the poetry of Muhammad Salih Bahr al-Ulum
...Show More Authors

يتناول البحث شخصية شعرية وأدبية فذة هو محمد صالح بحر العلوم الشاعر العراقي المعروف والمولود في بيت ثوري من بيوتات النجف المعادية للاستعمار البريطاني في مطلع القرن العشرين، وينحدر من أسرة عريقة مشهورة بالعلم والأدب، عاش بحر العلوم شاعراً ينقل بصوره الجمالية كل ما يقع في حواسه، وتجربته تثري من اتصاله ببيئته فنجد الشاعر اشبه بالمصور يستمد صوره من واقع بيئته المتنوع. ونحن في بحثنا هذا نحاول أن نرصد أهم المصادر التي ارتكز عليها الشاعر في بناء صوره الشعرية.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 15 2024
Journal Name
Journal Of Theoretical And Applied Information Technology
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec

... Show More
View Publication
Scopus (1)
Scopus
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (12)
Scopus Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
(Novels) Idiom , evolution and properties in the light of critic Shugaa Muslim Al-Aani
...Show More Authors

A critics ,Shugaa Muslim Al-Aany, has specific critical principles in his branch
classifications for the type of the novel that is linked with its sources and what is adopted
of critical approaches and curriculums. The novel by its type as a literary one has
occupied Al-Any's critical importance very much ,he has divided it historically according
to its historical development ,the impact of dr.Abd Al-Muhassen Tha Badr's divisions on
Al-Any cannot hidden.
In his speech about the origin of novel and story art generally , Al-Any becomes
between the acknowledgement of the affect of Al-Mgma in rising of this art and denied its
affect at last. He has classified the novel also as a stylistic classification:(an impression

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A General Overview on the Categories of Image Features Extraction Techniques: A Survey
...Show More Authors

In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Engineering Research And Advanced Technology
The Use of First Order Polynomial with Double Scalar Quantization for Image Compression
...Show More Authors

Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
The Imam Al-Zayla'i's Tracks on Imam Mardini   In his Banner Monument
...Show More Authors

The study of these selected traces shows that what Imam Mardini did on Imam al-Zayla'i and enabled him to graduate the hadiths of the book (guidance and conclusions) as well as in choosing the novel closest to Murad the work and not as described by al-Zayla'i .... never deserves descriptions.

View Publication Preview PDF
Publication Date
Sun Oct 06 2024
Journal Name
International Journal Of Advances In Engineering And Management (ijaem)
The makers of sedition in light of Chapters (Al-Baqarah and Yusuf)/An objective study
...Show More Authors

The makers of strife exist in every era and time. They differ in how these temptations are created and the methods used in doing so. In our modern era, they are more; This is due to the presence of information technology and its easy availability at their fingertips, as well as the spread of social networking sites, which are rapidly spreading among ignorant groups and groups that are deficient in their use. Which led the makers of sedition to exploit these matters and create various temptations and spread them among peoples and societies. Today, we cannot predict the future of humanity in light of this huge amount of temptation. What the Holy Qur’an mentioned about the types of temptations in its noble verses and their embodiment in seve

... Show More
Preview PDF
Publication Date
Sun Sep 30 2012
Journal Name
College Of Islamic Sciences
Meaning of formulation غ more actions      In Surat Al-Baqarah at the pride of honor
...Show More Authors

Praise be to God, who started his book with the praise of himself and prayers and peace be upon those who do not have a prophet after him and his family and companions and those who followed them with charity until the Day of Judgment. Either:
      The research examines the meanings of the formulas of the increased verbs that were mentioned in Surat Al-Baqara, at the imam of the imams of the Islamic nation, namely, Al-Fakhri Al-Razi (d. 606 AH), may God Almighty have mercy on him. With the imams of Quranic scholars.

View Publication Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Al-academy
Deploying of Animatic in TV Drama: محمد ثائر البياتي
...Show More Authors

This research laid the recruitment & use of IT Animatic digital TV drama & inviting ways of working is simple &effective in the level of producing images especially in TV drama, so the entry of this technology has created the concepts of new technology, and simple & effective at the same time with high level of modernity & technical innovation, this research deals with three chapters that includes two topics the animatic modes & the stages of production , & what is the atheistic aspects that is provided by this technology with the researcher reviewing the use of some TV dramatic Production series that was mentioned through this research.Which afterwards the researcher has analyzed a sample that was selected fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 28 2021
Journal Name
Journal Of The College Of Education For Women
The Developmental Role of Social Work in Reducing Social Extremism:A Field Study in Baghdad University-College of Mass Communication as a Model: محمد حميد علوان
...Show More Authors

This study deals with the role that social work profession plays in all its fields to reduce social extremismat home, or school or within society. The study aims to: examine the historical roots of social work in the Iraqi society, investigate the objectives of the developmental role of social work, review the theories of social extremism, its characteristics, and causes, and to analyze the developmental role of social work to limit social extremism. To meet the objectives of the study, a descriptive analytical approach has been adopted. It involves using the social sampling survey method, i.e., a questionnaire tool in the University of Baghdad community-College of Media. The sample was randomly selected to include (100) students from th

... Show More
View Publication Preview PDF
Crossref