Preferred Language
Articles
/
jcofarts-1264
Pioneering and Growth of Plastic vision data in Modern Art
...Show More Authors

The achievements of the art that we know today are questioned in motives that differ from what art knew before, including dramatic artistic transformations, which he called modern art.
In view of the enormity of such a topic, its ramifications and its complexity, it was necessary to confine its subject to the origin of the motives of the transformations of its first pioneers, and then to stand on what resulted from that of the data of vision in composition and drawing exclusively, and through exploration in that, we got to know the vitality of change from the art of its time.
And by examining the ruling contemporary philosophical concepts and their new standards and their epistemological role in contemporary life, since they include new artistic and aesthetic values, it was more useful to take them in this research to understand the consistency between thought and art in the current era, and from that the motives of modernization are an approach at the hands of the first pioneers With their homeland of innovative methods in the contemporary artistic experience

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
DYNAMIC MODELING FOR DISCRETE SURVIVAL DATA BY USING ARTIFICIAL NEURAL NETWORKS AND ITERATIVELY WEIGHTED KALMAN FILTER SMOOTHING WITH COMPARISON
...Show More Authors

Survival analysis is widely applied in data describing for the life time of item until the occurrence of an event of interest such as death or another event of understudy . The purpose of this paper is to use the dynamic approach in the deep learning neural network method, where in this method a dynamic neural network that suits the nature of discrete survival data and time varying effect. This neural network is based on the Levenberg-Marquardt (L-M) algorithm in training, and the method is called Proposed Dynamic Artificial Neural Network (PDANN). Then a comparison was made with another method that depends entirely on the Bayes methodology is called Maximum A Posterior (MAP) method. This method was carried out using numerical algorithms re

... Show More
Preview PDF
Scopus (1)
Scopus
Publication Date
Wed Sep 09 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Estimation of the Effect of the Government Expenditure Growth Rate on the Rate of Inflation in the Iraqi Economy for the Period (1991- 2015)
...Show More Authors

Government expenditure represents one of the controlling financial policies in the economic affairs and management of the economic cycle in order to achieve price stability, raise the rate of output growth and decrease the level of unemployment. The price stability represents one of the macroeconomic goals that all countries seek without exception, regardless of the economic philosophy adopted by each country; in addition to this is raising the productive capacity and reaching the actual output to the level of the expected output, that is, the level of output related to the natural unemployment rate or what is sometimes called the Non-inflationary unemployment rate. The restriction of government expenditure (G=T+∆B/iP+∆M/P) is

... Show More
Preview PDF
Publication Date
Tue Dec 11 2018
Journal Name
Arab Science Heritage Journal
الجغرافية الجغرافية و الطب
...Show More Authors

Find a study in the relationship between geography and medicine and a variety of sources, this study multiple. Valjgraveh is the image of the earth recipe haunted them and which of the seven regions and seas and mountains, prairies, rivers and cities geographical study of the Earth as the abode of the person or is the study of the natural environment of the human race and the geographical that analyzes the different factors that make up the natural environment and examines the impact of each factor separately and then the effects of all factors combined to human life and health and activity.

View Publication Preview PDF
Publication Date
Sun Apr 01 2007
Journal Name
Journal Of Educational And Psychological Researches
العنف السيكولوجية و العلاج
...Show More Authors

من المؤسف حقا ان نجد أنفسنا نعيش في ظروف عصيبة لم تشاهده أعيننا ولم تطرأ على مسامعنا من قبل، وجاء الاحتلال البغيض بكل تبعاته السلبية افرز عنه اليوم تفرقاً ملحوظا وصراعا اليماً وتناحراً أضر بمكانتنا ووحدتنا،  ولنا في كل يوم مصيبة وعويل، حتى صارت عبارة عن مذاهب وطوائف وأشخاص، تتنازعهم الأهواء والخرافات والتقليد والتعصب وأمراض أخرى، وباتت تلك الأشلاء يلعن بعضها بعضاً وينفي أحدها الآخر.

وص

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Fabrication and Characterization of Nanofibers Membranes using Electrospinning Technology for Oil Removal
...Show More Authors

Oily wastewater is one of the most challenging streams to deal with especially if the oil exists in emulsified form. In this study, electrospinning method was used to prepare nanofiberous polyvinylidene fluoride (PVDF) membranes and study their performance in oil removal. Graphene particles were embedded in the electrospun PVDF membrane to enhance the efficiency of the membranes. The prepared membranes were characterized using a scanning electron microscopy (SEM) to verify the graphene stabilization on the surface of the membrane homogeneously; while FTIR was used to detect the functional groups on the membrane surface. The membrane wettability was assessed by measuring the contact angle. The PVDF and PVDF / Graphene membranes efficiency

... Show More
View Publication Preview PDF
Crossref (1)
Clarivate Crossref
Publication Date
Mon Feb 14 2022
Journal Name
Journal Of Educational And Psychological Researches
The Educational and Psychological Effects of Social Networking websites on Iraqi Society
...Show More Authors

The aim of the research is to identify the educational and psychological effects of the positive and negative aspects of using social networking websites. The researcher administered a number of questions to (250) users of different types of social networking websites. He analyzed his research results and obtained a number of results. The research has reached a number of recommendations and suggestion: Regulating the use of social media. Monitoring the parents of the sites used by children in a way that they do not feel they are observers. It is necessary to devote an hour daily to show the importance of real social life for children other than using social media. It is necessary to show the importance of choosing friends who hav

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
The Cluster Analysis by Using Nonparametric Cubic B-Spline Modeling for Longitudinal Data
...Show More Authors

Longitudinal data is becoming increasingly common, especially in the medical and economic fields, and various methods have been analyzed and developed to analyze this type of data.

In this research, the focus was on compiling and analyzing this data, as cluster analysis plays an important role in identifying and grouping co-expressed subfiles over time and employing them on the nonparametric smoothing cubic B-spline model, which is characterized by providing continuous first and second derivatives, resulting in a smoother curve with fewer abrupt changes in slope. It is also more flexible and can pick up on more complex patterns and fluctuations in the data.

The longitudinal balanced data profile was compiled into subgroup

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref