The tagged search (The aesthetic images in Mohammed Thanoun graphic) four chapters, Chapter I was concerned the statement of the research problem, the research importance and it’s needed, the goal of research in identifying the aesthetic images in the graphic of the artist's, the research limits, and identifying the most important terms, chapter II came with theoretical framework and included three chapters: chapter I was interested in the aesthetic concept. chapter II is the image aesthetic in the graphic, and chapter III is the artist experience, Chapter III specializes in research procedures: community, sample, curriculum, tool, and sample analysis. Chapter IV ended with results, including: dynamic research sample illustrated of the diverse and changing movement and the artist's ostracism and resentment from the rigid style. then the results included: He evokes the past in his artistic productions in structures of images aesthetic to remember his childhood by its social realism.
The search in these subjects makes an importanl accomplishment in the study of the scientific life in that (era) specialy what the wonen had from a scientific and social level in that(age) the studies of the scientestis which were brilliant in the this era never hed the same as the first scientests . because of the common mistakes toward some resesrchers
يختبر البحث الحالي علاقة الأثر والارتباط بين إدارة المعرفة التنظيمية (المتمثلة قيادة المعرفة، تنظيم المعرفة، عمليات المعرفة، ثقافة المعرفة، تطبيق المعرفة، تقاسم المعرفة) ومتغير (رأس مال الزبون) في مجموعة من المصارف الأهلية في محافظة النجف إذ تمثلت مشكلة الدراسة بمدى دور إدارة المعرفة في هذه المصارف فضلاً عن الزبائن الذين يتعاملون معها، وقد استخدمت استمارة الاستبيان كأداة رئيسة لجمع البيانات إذ تم تو
... Show MoreThrough recent years many researchers have developed methods to estimate the self-similarity and long memory parameter that is best known as the Hurst parameter. In this paper, we set a comparison between nine different methods. Most of them use the deviations slope to find an estimate for the Hurst parameter like Rescaled range (R/S), Aggregate Variance (AV), and Absolute moments (AM), and some depend on filtration technique like Discrete Variations (DV), Variance versus level using wavelets (VVL) and Second-order discrete derivative using wavelets (SODDW) were the comparison set by a simulation study to find the most efficient method through MASE. The results of simulation experiments were shown that the performance of the meth
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreLaboratory studies were conducted at the biological control unit, college of Agriculture, University of Baghdad to evaluate some biological aspects of the predator Chilocorus bipustulatus (Coleoptera: Coccinellidae), which is considered one of the most important predators on many insect pests, especially the scale insect, Parlatoria blanchardi, (Homoptera: Diaspididae) on date palms. The results showed that biological parameters of the predator were varied according to different degree of temperature. Egg incubation period was significantly different and reached to 7.5 and 5.44 day at 25 and 30°C respectively, Fertility was the same 100% at both temperature degrees. Larval growth periods were 17.41 and 16.12 day as well as the mortality
... Show MoreAbstract
Objective / Purpose: Online social relationships through the emergence of Web 2.0 applications have become a new trend for researchers to study the behavior of consumers to shop online, as well as social networking sites are technologies that opened up opportunities for new business models. Therefore, a new trend has emerged, called social trade technology. In order to understand the behavioral intentions of the beneficiaries to adopt the technology of social trade, the current research aims at developing an electronic readiness framework and UTAUT model to understand the beneficiary's adoption of social trade technology.
Design/ methodology/ Approach: To achieve the obje
... Show Moreيناقش البحث المقومات المادية والمجتمعية والموضوعية للدور الاقليمي العراقي بعد العام 2010 والفرص المتاحة والقيود التي تحد منه والافاق المستقبلية لهذا الدور في ظل بيئة اقليمية تسودها منظومات تحالف متناقضة في الاهداف والاستراتيجيات
This research includes an analytical and critique study for the version of the University Service Law No.23 for the year 2008, containing all its aspects and failure whether in its legislation or its applications.
يهدف البحث إلى تحضير سلسلة من معقدات العناصر الانتقالية ثنائية التكافؤ(المنغنيز, الكوبلت, النيكل, الخارصين والكادميوم) مع المركب الجديد(KL) والمشتق من تفاعل ثنائي كبريتيد الكاربون و المركب الوسطي (HD). شخصت المعقدات ذات الصيغة العامة[M(L)2] بواسطة طيف الرنين النووي المغناطيسي البروتوني والكربوني للمركب الجديد وقياسات الأشعة تحت الحمراء والطيف الإلكتروني ودرجات الانصهار و التوصيلية المولارية و ت
... Show More