The history of the arts is closely connected with the history of humankind, since it is impossible to separate our scientific and artistic advances’. Therefore, the current research focuses on the close bond between art and other disciplines. The connection of the arts to the sciences is unequivocal and undisputed; the contributions of artists to the various scientific domains are clear. If one scrutinises the ability of artists to participate in building societies, one will find that the arts have penetrated deeply into a range of products and inventions, starting with the pencil and ending with the missile. The artist’s contributions play a part in the minutest of details across all fields of industry: production, craftsmanship, me
... Show MoreArt education is one among the fundamental subjects for elementary school students, because it contributes to assembling learners’ personalities and developing their technical skills. For this reason, this research comes, which aims to understand the effect of the task groups’ strategy in developing the performance of elementary school students in art education. to realize the goal of the research, the researcher put the subsequent hypotheses:
-There is not any statistically significant difference at the amount (5%) between the typical many students between the experimental group that studied consistent with the strategy of task groups and therefore the control group that studied in keeping with the same old method that they obt
Poisoning with toxic substances accidently or deliberately can be life threatening and especially in some countries that lack the essential tests and facilities to identify the types and causes of these toxic substances. In Iraq, as many other countries, poisoning is one of the chronic public health problems. However, very little literature about the pattern of poisoning cases, types and age is available in Duhok Governorate. Therefore, this study was conducted to determine the most common patterns of poisoning and the related age and gender in Duhok Governorate from 2016-2018, which would possibly contribute to the early diagnosis and treatment of poisoning. The present study was conducted for three years, started from 1st of
... Show MoreThis study aims to know the degree of importance and the availability of the enhancing specifications of the educational process, and the way its objectives are achieved. Such a step involves using educational techniques, laying the selection foundations, knowing the methods of their employment and tracking the obstacles that limit this employment in teaching Arabic to non-native speakers. To achieve these objectives, the study followed a descriptive approach, and collected the necessary data through an integrated questionnaire prepared for the purpose of describing the phenomenon or topic. This approach was adopted, as it is characterized by being comprehensive, focuses on collecting data related and necessary to the topic under study.
... Show MoreSingled current study on the subject of shorthand in structure designs logos (Iraqi sports clubs model), as the current study Tdmt four chapters, was in the first chapter defines the research problem and its significance, as well as the aim of the research in the know shorthand formal in structure designs logos (Iraqi sports clubs model ), and identifies Find time limits: - slogans Iraqi sports clubs for the years (1956 - 1970), because it represented the years to include designs slogans official Iraqi sports clubs that have been elected in this period for the purpose of examining the reality of the design in the current search. And it represented the spatial limits: - the Republic of Iraq - Iraqi slogans designs sports
... Show MoreCentral and Eastern European Online Library - CEE journals, documents, articles, periodicals, books available online for download, Zeitschrfitendatenbank, Online Zeitschriften, Online Zeitschriftendatenbank
Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More