Preferred Language
Articles
/
nRc9Po4BVTCNdQwCND5r
Art Image Compression Based on Lossless LZW Hashing Ciphering Algorithm
...Show More Authors
Abstract<p>Color image compression is a good way to encode digital images by decreasing the number of bits wanted to supply the image. The main objective is to reduce storage space, reduce transportation costs and maintain good quality. In current research work, a simple effective methodology is proposed for the purpose of compressing color art digital images and obtaining a low bit rate by compressing the matrix resulting from the scalar quantization process (reducing the number of bits from 24 to 8 bits) using displacement coding and then compressing the remainder using the Mabel ZF algorithm Welch LZW. The proposed methodology maintains the quality of the reconstructed image. Macroscopic and quantitative experimental results on technical color images show that the proposed methodology gives reconstructed images with a high PSNR value compared to standard image compression techniques.</p>
Scopus Crossref
View Publication
Publication Date
Sun Jun 11 2017
Journal Name
Al-academy
Intellectual Dimensions of Architectural Murals Art in Ancient Iraq (Pottery and Glazes)
...Show More Authors

. Mesopotamian art is thase mployed all around him into forms for artistic purposes and different con not at ions help him to understand the world around him and customized for their interests

The mural architectural art has distinguished traits that made it promote to the rank of the prominent arts that have been employed  by the Mesopotamian human to relate to the world  the heroic deeds and exploits  of that civilization ,that formed greatest and most splendid wonderful works that still illustrious and outstanding  till nowadays .The mural  architectural  art of pottery and glazed considered one of the most ancient wonders  of Mesopotamian creation in Old Iraq .The best quintessence of mural

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
Evaluation of user interface designs in official websites "Fine Art Colleges Model"
...Show More Authors

I found that it does not meet some of the requirements, including browsing and organizing structural elements, which is something in which the researcher found a scope for research, and from here she can formulate the problem of her research with the following question: Is there an actual need to develop user interface designs in the websites of Iraqi colleges of fine arts? The research included four chapters (the first chapter - the research problem - the second chapter (theoretical framework), which included three sections, the first is to identify the user interface, the second topic is the structural elements, and the third topic includes the rules of interface design and the dimensions of interaction), as well as the third chapter i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Al-academy
Aesthetic art of stained glass in the middle Ages Study (historical analysis)
...Show More Authors

This paper deals with the role of the clergy in the Church and artists in the emergence of this art, which is represented by an atmosphere of spiritual, aesthetic, artistic, technical and engineering very magnificence and is located in two Find.Chapter One: the stages of stained glass in the Middle AgesThe Architects Goths to get rid of the walls gradually, based Baloctav plane, columns and beams strengthened with the vehicle, as previously mentioned, making the building looks like a glass of excessive use of colored windows building, this art has been known to the art of stained glass And the second chapter: the stages of stained glass in the Middle Ages Department of Winston (Winston) works of stained glass since its inception in the t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 15 2021
Journal Name
Al-academy
Virtual Art Exhibitions In Times Of The Corona Pandemic: منى سعد القرني
...Show More Authors

This study aims to identfy virtual plastic art exhibitions in light of the challenges of the Corona pandemic. It used a descriptive analytical method through several questions and examining future challenges via the Internet in publishing virtual plastic art exhibitions in many parts of the world in light of the challenges of the Corona pandemic. For that, it used Arab and foreign references.
The study reached many results, the most important of which are: The detection of virtual reality applications and their impact on the plastic arts exhibitions sector. Besides, the insights gained from future art gallery research with VR technology could provide direct and practical value for this sector. By using a technology, similar to the “

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
The educational means used by teachers of art education in primary schools
...Show More Authors

      Education varies in terms of form and content between verbal and abstract education through the delivery of knowledge and enriching experiences through verbal communication and ephemeral learning and based on sensory experiences that provide visual and audio visualizations that make it imperative to install and retain knowledge and experience. It is obvious that meanings And the concepts grow the more tangible sensory experiences that make the process of communication highly efficient, and the more the learner's acquisition of direct sensory experiences, ie the first source is the life situations and normal circumstances of the process of communication, but if these can not be available It is necessary to a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Improve topic modeling algorithms based on Twitter hashtags
...Show More Authors
Abstract<p>Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned</p> ... Show More
View Publication
Scopus (19)
Crossref (17)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Classification of fetal abnormalities based on CTG signal
...Show More Authors

The fetal heart rate (FHR) signal processing based on Artificial Neural Networks (ANN),Fuzzy Logic (FL) and frequency domain Discrete Wavelet Transform(DWT) were analysis in order to perform automatic analysis using personal computers. Cardiotocography (CTG) is a primary biophysical method of fetal monitoring. The assessment of the printed CTG traces was based on the visual analysis of patterns that describing the variability of fetal heart rate signal. Fetal heart rate data of pregnant women with pregnancy between 38 and 40 weeks of gestation were studied. The first stage in the system was to convert the cardiotocograghy (CTG) tracing in to digital series so that the system can be analyzed ,while the second stage ,the FHR time series was t

... Show More
View Publication Preview PDF
Crossref