Preferred Language
Articles
/
jcofarts-1075
The Cultural Identity in David Gentelman’s Works
...Show More Authors

The study of cultural identity and its data in the designer’s work is considered a cultural nature to highlight the cultural identity and link it to the national culture of their country and society. It provides a reflection and translation of the society’s culture, traditions, social and economic dimensions, the natural environment, and scientific phenomena. Within meanings translated into a variety of methods, including expressive and realistic, which defines the designer’s relationship with his society and the national culture of his country and his connection with the civilization of the country.
The research problem came with the following question: What are the data of cultural identity in the work of designer David Gentleman? while the researcher identified four chapters for this study as follows:

The first chapter to clarify the methodological framework of the research, while the second chapter represented the theoretical framework and by two chapters: the first included the concept of cultural identity in graphic design, while the second topic included the diversity of identity in the designer's work, while the third chapter represented the research procedures, and the fourth chapter included the results and conclusions, including:

1. The designer's thought is formed from the cultural identity of his country and society, and therefore the designer has an important role in the image of his design product of the character.
2. The religious identity had a clear impact on the designer's style, which affected the process of artistic production of stamps.
3. The nature of the designer's interaction with his environment, with all its factors, reflects the achievement of an environmental identity (natural) in the character designs.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of select

... Show More
View Publication Preview PDF
Scopus (26)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Sun Jun 18 2023
Journal Name
Arab Science Heritage Journal
رعاية الايوبييـن للعلـم والعلمـاء في مصـر وبـــــلاد الشـــــــام (567-648هـ/1171-1250م)
...Show More Authors

The Ayyub era witnessed a popular for science, knowledge and became the Ayyub state in its various regions a scientific beacon، despite their preoccupation with wars with the Crusaders now that did not discourage them from their care for science and scientists، and this scientific renaissance had many factors، foremost of which are the tendencies of the sultans and Ayyub kings to pay attention to science and its care، through their establishment of the role of science

View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
أجـــــوبة الحافظ محمد البرزالي على سؤالات العز ابن الحاجب في الجرح والتعديل
...Show More Authors

ملخص البحث بالعربي

عنوان البحث : أجـــــوبة الحافظ محمد البرزالي على سؤالات العز ابن الحاجب في الجرح والتعديل

يهدف البحث : إلى جمع أجوبة الحافظ أبي عبدالله محمد البرزالي في الجرح والتعديل، ودراستها.

يتكون البحث من : مقدمة، وتمهيد، نص السؤالات، وخاتمة، وفهارس.

المقدمة : تسمية الموضوع، وسبب اختياره، وأهميته .

والتميهد : ترجمة مختصرة للحافظ أبي عبدالله البرزالي، والتعريف بأجوبة الحافظ الب

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Educational And Psychological Researches
القيادة التربوية في ضوء نظريتي x-yوعلاقتها بالروح المعنوية لمديري المدارس الإعدادية
...Show More Authors

This study aimed to identify the educational leadership in the light of my theory xy and its relationship to the morale of the managers of the junior high school as the study population consisted of directors of junior high school in the city of Baghdad of six directorates education for the academic year 2013-2014 AD The number of managers (211) as director, and amounted to a sample Search of (150) director and director of the research community overall rate (71%) and represent this community fully representative sample, two tools were used in the study: the first measure of educational leadership in the light of my theory xy and the second tool to gauge morale.

Results concluded that the

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 25 2018
Journal Name
وقائع مؤتمر
تطبيقات انماط قيادة التعقيد في المؤسسات المستندة على المعرفة (التعليم العالي انموذجاً)
...Show More Authors

Publication Date
Sun Jul 03 2005
Journal Name
Political Sciences Journal
عرض رسائل واطاريح (اثر التواجد العسكري الامريكي على النظام السياسي في العراق)
...Show More Authors

اثر التواجد العسكري الامريكي على النظام السياسي في العراق

View Publication Preview PDF
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Nano Fluid Detection for HPHE System Using Different Lasers
...Show More Authors

Among the different passive techniques heat pipe heat exchanger (HPHE) seems to be the most effective one for energy saving in heating ventilation and air conditioning system (HVAC). The applications for nanofluids with high conductivity are favorable to increase the thermal performance in HPHE. Even though the nanofluid has the higher heat conduction coefficient that dispels more heat theoretically but the higher concentration will make clustering .Clustering is a problem that must be solved before nanofluids can be considered for long-term practical uses. Results showed that the maximum value of relative power is 0.13 mW at nanofluid compared with other concentrations due to the low density of nanofluid at this concentration. For highe

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 30 2025
Journal Name
مجلة كلية التربية الأساسية للعلوم التربوية والإنسانية
سمات الشخصية المفضلة لدى معلمي ومعلمات التربية الخاصة في العراق (دراسة عاملية)
...Show More Authors

يستهدف البحث الحالي التعرف إلى 1 .بناء مقياس سمات الشخصية المفضلة لدى معلمي ومعلمات التربية الخاصة في العراق من وجهة نظر ذوي اإلختصاص والعاملين في هذا المجال. 2 .مستوى توافر سمات الشخصية المفضلة لدى معلمي ومعلمات التربية الخاصة في العراق من وجهة نظر ذوي اإلختصاص والعاملين في هذا المجال. 3 .داللة الفروق اإلحصائية في سمات الشخصية المفضلة لدى معلمي ومعلمات التربية الخاصة ً في الع ارق من وجهة نظر ذوي اإلختصاص والعا

... Show More
View Publication
Publication Date
Fri Jan 04 2013
Journal Name
المجلة السياسية والدولية
عوامل تكوين الرأي العام وتأثيره في السياسه الخارجيه المصريه بعد عملية التغيير
...Show More Authors

View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (9)
Scopus Clarivate Crossref