The techniques of contemporary Iraqi painting and their reflection on the productions of students of art education is an important subject in the field of painting at the theoretical and practical levels in academic study, whether theoretical or practical. Al-Iraqi is one of the arts with historical roots and a distinguished position among other artistic genres. Painting has received a sufficient level of development through the use of various contemporary techniques to advance it for the better.
The methodological framework included the problem of research and the need for it, and then the importance of research came in shedding light on the techniques of contemporary Iraqi painting, and the impact of these techniques on the productions of students of art education and the benefit that was reflected in their official productions. The research aimed to reveal the immediate techniques and their mechanisms, and the extent of their reflection on the productions of art education students. By stopping and defining terms?
The theoretical framework included two sections: the first: a historical introduction to contemporary Iraqi painting, its roots and beginnings. The second: contemporary Iraqi painting techniques. The research procedures included: The research community and the research sample included (3) official works,
The results and conclusions reached by the two researchers:
1. The techniques appeared strongly in all the art education students’ outputs in all samples.
2. The student relied on his imagination to produce new formal compositions.
3. The small number of textbooks on drawing techniques to be taught to students of the Department of Art Education.
The current research aims to analyze the extent of the adoption of the standards of ISO 45001: 2018 for occupational safety and health management by the General Establishment of Civil Aviation. The research problem was the extent to which the General Establishment of Civil Aviation approved ISO 45001: 2018 for occupational safety and health management. The questionnaire was used as a primary data collection tool, the sample was distributed (50) form, they were selected from the category of employees of the establishment at different levels to represent the research community. Data were analyzed using the statistical package (SPSS), a number of vector statistical methods were used as well as arithmetic mean, standard deviation, an
... Show MoreThe change in the size of the droplets during the pesticide application process could have a negative impact on the percentage of drift or the losses of pesticides to the environment. One of the factors that could affect the droplet size produced from a single nozzle is the internal design of the nozzle itself, in addition to the wear of the nozzle orifice as a result of the usage time. In this research, three types of nozzles with different internal designs were used (Turbo TeeJet (TT), Turbo TwinJet (TTj 6011003), and Drift Guard (DG 11003)). The nozzles were subjected to an accelerated wear test for one hundred hours, and different droplet size parameters (Dv 0.1, Dv 0.5, Dv 0.9),
In this research we investigated the corrosion behavior of the commertialy pure titanium and Ti-6Al-4V alloy that coated with hydroxyapatite by electrochemical deposition with applied voltage (6,9,12) Volt from aqueous solution containing Ca(NO3)2.H2O =7.0 gm/l , (NH4)2HPO4 =3.5 gm/l , Na(NO3)2 = 8.5 gm/l in order to improve the bonding strength of hydroxyapetite and medical metals and alloys and increasing the biocompatibility. The coating layer morphology was investigated by XRD, Optical microscope , and SEM tests, the corrosio tests was made by use senthesys simulated body fluid (SBF) , and we found that the propreate voltage for coatint on Ti was 9 Volt and for Ti-6Al-4Vwas12Volt.
AR Al-Heany BSc, PKESMD MSc., PSAANBS PhD, APAANMD MSc., DDV, FICMS., IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2014 - Cited by 14
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
The research aimed to identify "the effectiveness of educational-learning design according to the model of brain compatibility in achievement among firstmiddle grade students in mathematics", in schools affiliated with the Second Karkh Directorate of Education. To achieve the goal of research, the following zero hypothesis has been formulated: " There is no statistically significant difference at the semantic level (05.0) between the average scores of experimental group students who will study with design accreditation (educational - learning) according to the brain compatibility model and the grades of control group students who will study in the usual way in the achievement thinking test". The research community, which is represented by
... Show MoreThis study aims to find out the effectiveness of a cognitive-behavioral counseling program in enhancing self-management in reducing the academic procrastination of tenth-grade male students. The sample consisted of (26) male students divided into an experimental group of (13) students and a control group of (13) students. Two scales of self-management and academic procrastination were used, prepared by the researcher. The counseling program was prepared by the researcher. The results showed the program's effectiveness in enhancing self-management and reducing academic procrastination in the posttest, as it showed the continuation of this enhancement in self-management and the increase in the reduction of procrastination in the follow-up
... Show Moreأولاً: مشكلة البحث:
على الرغم من أن كل شخص هو كائن متفرد بحد ذاته ، إلا أن هناك تشابهات مشتركة بين كثير من الناس ، وتشكل هذه التشابهات أنماطآ شخصية يهدف علم النفس إلى دراستها وفهمها.
وقد حاول علماء النفس والمنظرون في مجال الشخصية بناء أنظمة نظرية لتغطية التباين الواسع بين الأفراد في السلوك ضمن المواقف المختلفة. وهدفت جهودهم إلى فهم الدافعية البشرية ، والسلوك عن طريق عملية النمو
... Show MoreThe study of these selected traces shows that what Imam Mardini did on Imam al-Zayla'i and enabled him to graduate the hadiths of the book (guidance and conclusions) as well as in choosing the novel closest to Murad the work and not as described by al-Zayla'i .... never deserves descriptions.
Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well a
... Show More