Preferred Language
Articles
/
jcofarts-1133
The Written Text in Conceptual Art (An Analytical Study)
...Show More Authors

The tagged research problem (the outputs of the written text in conceptual art) dealt with a comparative analytical study in the concept of conceptual art trends (land art - body art - art - language).

The study consisted of four chapters. The first chapter dealt with the theoretical framework, which was represented in presenting (the research problem), which raised the following question: What is the role of the written text in the transformations of the conceptual arts?

The first chapter included (the importance of research) and (research objectives) seeking to conduct comparative research in the written text within the trends of conceptual art as a moving phenomenon in art, and to reveal the variable written text in the trends of conceptual art. As for the limits of the research, it focused on studying the concept of the written text in the works of conceptual art trends and their outputs, by analyzing their illustrated works from the period 2002-2013 in Europe and America. The chapter also included (defining terms) The second chapter: which is represented by the theoretical framework, contains two topics: The second chapter: which is represented by the theoretical framework, contains two topics:

The first topic: an introduction to the concept of writing in the visual field. Conceptual art also dealt with the cognitive and artistic root. As for the second topic, it included: the written text in conceptual art

The third chapter (procedural framework): is concerned with research procedures, defining the research community and selecting the research sample from it, the number of which is (5) models, from the directions of conceptual art, then the research tool and sample analysis.
The fourth chapter: includes the results of the analysis of samples for each direction, then the results of the comparative analysis, conclusions, recommendations and proposals, and a list of sources and translation of the research summary in English.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (15)
Crossref (4)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The regulatory climate in the government and private kindergarten children (Comparative Study)
...Show More Authors

The research problem boils question is there in Riyadh organizational climate that enables them to do their work properly and whether there are differences between the government and private Riyadh depending on the organizational climate has sought Find measure: 1 regulatory climate for kindergarten 2. The difference between government and private Riyadh depending on the organizational climate. Limited research on the (200) parameter of the Riyadh government and private parameters for the year (20,142,015) In order to achieve the research objectives the researchers built a regulatory climate in accordance with the scientific steps to build a psychological scales measure After the formulation of climate regulation paragraphs of the (30) p

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2017
Journal Name
College Of Islamic Sciences
The role of the media in promoting tolerant religious values: intellectual study
...Show More Authors

Research summary

Informing means informing and informing, which is conveying information to someone and confirming his narration with it. Accordingly, information is its main content..and it has multiple means, including visual, audio and read, and it has become the dominant role in the process of socialization, and much of what we hear, read, or watch in the media is not devoid of a goal, and expresses that scientifically as “charged with values” ( Value Loaded)..Values that are: the set of beliefs that the individual holds towards things, meanings, and various aspects of activity, which direct his desires and attitudes towards them, and determine for him acceptable and unacceptable behavior, right and wrong, and all of this

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Al-mustansiriyah Journal Of Science
Encrypting a Text by Using Affine Cipher and Hiding it in the Colored Image by Using the Quantization stage
...Show More Authors

ST Alawi, NA Mustafa, Al-Mustansiriyah Journal of Science, 2013

View Publication
Publication Date
Tue Oct 06 2020
Journal Name
College Of Islamic Sciences
النص القرآني في فكر توشيهيكو إيزوتسو (Toshihiko Izutsu) دراسة من خلال كتابه (الله والإنسان في القرآن)
...Show More Authors

The researcher wanted in this research to shed light on one of the epistemological readings of the Quranic text, which is the reading of the Arabized Japanese researcher (Toshihiko Izutsu) in his book (God and Man in the Qur’an) and to explain what he has and what is on it.        

The summary of the facts in which he came out is that the knowledge reading of Toshihiko towards the Qur’anic text is old in concept. The oldest people have dealt with it in their works and what their pens have learned about, except that they have eaten and studied them under many headings such as: proportionality, consistency, systems and the like in terms, and the researcher has sought thro

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE SUSTANABLE MARKETING IMMUNITY OF TOURIST OF BUSINESS IN LIGHT OF THE PANDEMIC-CORONA (COVID-19) AN APPLIED RESEARCH IN TRAVEL AND TOURISM COMPANIES IN BAGHDAD: THE SUSTANABLE MARKETING IMMUNITY OF TOURIST OF BUSINESS IN LIGHT OF THE PANDEMIC-CORONA (COVID-19) AN APPLIED RESEARCH IN TRAVEL AND TOURISM COMPANIES IN BAGHDAD
...Show More Authors

The research aims to how to deal with certain situation to ensure the continuous competitive excellence of business market under the situation of covid-19, especially how to deal with major challenges, identifying the capabilities of tourism industry, investigating the ability of tourism agencies to resist the dynamic change of both internal as well as external environment to ensure their sustainability.

The important here as the paper notice, is how to be efficient and trying to find solutions in order to grow and survive through choosing certain strategies that aligned the critical issues.

Thus to achieve this level, many scenarios planed that could adopt in case of such pande

... Show More
View Publication Preview PDF