The present research aims at revealing the advertising image semiotics in the American printed poster by following the image's significance and its transformations through the poster design trends and indicating its nature whether it is an explicit or implicit image. The limits of the research were the American printed poster during 2016-2018 period. The theoretical side was determined by two sections, the first: (the advertising image semiotics) and the second (design trends in the printed poster). The research procedures were represented by the research method adopted in the analysis of the sample models identified in four models taken from the research community which contains (24) models. The selection was made according to the trend and type of the mark and then analyzed according to a research tool whose paragraphs were bases taken from the theoretical framework. After analyzing the models that represent the research sample, the researcher reached at a set of results and conclusions and the most prominent of these were that ( the designers aimed at topics devoted in the collective memory such as the pigeon, olive branch, umbrella and freedom statute as part of the act of communication and the communication theory which the designer does not find difficult to convey), in accordance with the subject of his research in light of the focus on the advertising image based on the mark logic and his analysis of the semiotics of that image.
This research paper tries to show the significance of the narrative structure in the television advertisement and its connotations. The researchers chose the annual advertisement of Zain Mobile Telecommunication Company for the year 2020, which shed light on the global Corona pandemic crisis. The idea of the advertisement won wide approval as it focused on the suffering that everyone is witnessing like medical and security personnel in particular, and family relationships consequences.
In addition to the positive global interaction with the message presented by the Company in these exceptional circumstances. The advertisement, which lasted for 2.35 minutes, exceeded 13 million views in a short period of time. This prompted us to choos
The aim of this study was to study TV advertising and consumer behavior in children and to meet the needs of children. The study included 100 children from Baghdad who were randomly selected from different regions ranging in age from 9-12 years of both males and females. The current research was based on the interview and the completion of special forms prepared for this purpose. This age group was selected for the rare studies conducted on television advertising and limited to different sectors. Data on age and sex were documented, as the results of this study proved The afternoon period was the preferred period for watching the TV show in males, where it was 22%, while the morning period was the female favorite, and it was 23%. The ind
... Show MoreCompressing an image and reconstructing it without degrading its original quality is one of the challenges that still exist now a day. A coding system that considers both quality and compression rate is implemented in this work. The implemented system applies a high synthetic entropy coding schema to store the compressed image at the smallest size as possible without affecting its original quality. This coding schema is applied with two transform-based techniques, one with Discrete Cosine Transform and the other with Discrete Wavelet Transform. The implemented system was tested with different standard color images and the obtained results with different evaluation metrics have been shown. A comparison was made with some previous rel
... Show MoreThis article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreThe present study examines critically the discursive representation of Arab immigrants in selected American news channels. To achieve the aim of this study, twenty news subtitles have been exacted from ABC and NBC channels. The selected news subtitles have been analyzed within van Dijk’s (2000) critical discourse analysis framework. Ten discourse categories have been examined to uncover the image of Arab immigrants in the American news channels. The image of Arab immigrants has been examined in terms of five ideological assumptions including "us vs. them", "ingroup vs. outgroup", "victims vs. agents", "positive self-presentation vs. negative other-presentation", and "threat vs. non-threat". Analysis of data reveals that Arab immig
... Show MoreDeveloping an efficient algorithm for automated Magnetic Resonance Imaging (MRI) segmentation to characterize tumor abnormalities in an accurate and reproducible manner is ever demanding. This paper presents an overview of the recent development and challenges of the energy minimizing active contour segmentation model called snake for the MRI. This model is successfully used in contour detection for object recognition, computer vision and graphics as well as biomedical image processing including X-ray, MRI and Ultrasound images. Snakes being deformable well-defined curves in the image domain can move under the influence of internal forces and external forces are subsequently derived from the image data. We underscore a critical appraisal
... Show MoreA new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.