Preferred Language
Articles
/
jcofarts-50
Integrative Relationship between the Picture and the Written Text in the Commercial Advertisement
...Show More Authors

There is no doubt that the   advertisement picture  and the written text play  a key role in the formation of the language of the communicative discourse as the main pillars of the design of commercial advertising and the main entrance for the  advertising message awareness... Hence the researcher chose the title of her research (Integrative Relationship between the Picture and the Written Text in the Printed Commercial Advertisement) starting from following questions: What is the relationship between the picture and the written text in the printed commercial declaration? Is there functional, aesthetic and interactive integration between them?

                 The importance of the research stems from the possibility of its contribution to the enrichment of the cognitive aspect of the complementarity of the relationship between the picture and the written text in the design of the printed commercial advertisement for the specialists researchers and   workers and those interested in the field of design.

                 The research also aims at revealing the integration of the relationship between the picture and the written text in the design of the printed commercial advertisement.

                The research limits were determined to the study of commercial advertisements of the United States of America published on the Internet in 2016.

               The theoretical framework of the research included the problem of research, its importance, its objectives, and its objective, temporal and spatial limits. The theoretical framework included two sections: the first section is about the concept of complementarity in the typographic achievement.

       The second section dealt with the effectiveness of the relationship between the picture and the written text in the commercial advertisement.  The research procedures and the most important findings and conclusions are then presented. The most important results that have been achieved are as follows:

                1 – The employment of the advertising picture as the main unit that occupies the majority of the advertising space, while the written text explains and supports it, achieving a coherent relationship between the visual and intellectual situation.

                 2 –The presence of words alongside the picture helps in opening the horizons to the thinking of the recipient, especially in the case of words compensation for the inability of the fixed advertisement picture in the expression of temporal or causal links

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Compare between result of analysis of variance after and before use analysis covariance to Split-blocks design
...Show More Authors

This research aims to study the important of the effect of analysis of covariance manner for one of important of design for multifactor experiments, which called split-blocks experiments design (SBED) to deal the problem of extended measurements for a covariate variable or independent variable (X) with data of response variable or dependent variable Y in agricultural experiments that contribute to mislead the result when analyze data of Y only. Although analysis of covariance with discussed in experiments with common deign, but it is not found information that it is discussed with split-Blocks experiments design (SBED) to get rid of the impact a covariance variable. As part application actual field experiment conducted, begun at

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
The dialectic of the familiar and the unfamiliar in Islamic photography
...Show More Authors

This research is concerned with the study of (the dialectic of the familiar and the unfamiliar in Islamic photography), and it consists of four chapters.
If you dealt with the problem of the research subject (the dialectic of the familiar and the unfamiliar in Islamic photography, as it appeared realistic, familiar forms and strange and strange unfamiliar forms represented in many of the main schools of Islamic photography that emerged in Iraq and Persia and then the Ottomans and the However, Islamic painting still retains those previously witnessed and unseen images, which pose themselves forcibly in the form of many questions that must be faced and studied by investigation, observation, extrapolation and conclusion through scientifi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Poor impurity in the right of the patient and the elderly
...Show More Authors

Poor impurity in the right of the patient and the elderly

View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (15)
Crossref (4)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Some Methods for Estimating the Survival Function and Failure Rate for the Exponentiated Expanded Power Function Distribution
...Show More Authors

 

     We have presented the distribution of the exponentiated expanded power function (EEPF) with four parameters, where this distribution was created by the exponentiated expanded method created by the scientist Gupta to expand the exponential distribution by adding a new shape parameter to the cumulative function of the distribution, resulting in a new distribution, and this method is characterized by obtaining a distribution that belongs for the exponential family. We also obtained a function of survival rate and failure rate for this distribution, where some mathematical properties were derived, then we used the method of maximum likelihood (ML) and method least squares developed  (LSD)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
Psychological Pollution in Iraqi Society and its Relationship With some Variables
...Show More Authors

The research aims to identify the level of psychological pollution in Iraqi society and the significant differences in psychological pollution in the Iraqi society according to variables. A sample of (600) individuals randomly selected from all governorates of Iraq, with (285) males and (315) females was used in the current study. The researcher adopted the scale of (Muhammad, 2004) psychological pollution consisting of (118) items, which limited (46) items after modification distributed into four areas: denial and abuse of the civilized identity, attachment to foreign formal aspects, effeminacy, and anarchism. The results of the research showed that there is no statistical significance among the individuals of the research sample. They

... Show More
View Publication Preview PDF