Preferred Language
Articles
/
jcofarts-1264
Pioneering and Growth of Plastic vision data in Modern Art
...Show More Authors

The achievements of the art that we know today are questioned in motives that differ from what art knew before, including dramatic artistic transformations, which he called modern art.
In view of the enormity of such a topic, its ramifications and its complexity, it was necessary to confine its subject to the origin of the motives of the transformations of its first pioneers, and then to stand on what resulted from that of the data of vision in composition and drawing exclusively, and through exploration in that, we got to know the vitality of change from the art of its time.
And by examining the ruling contemporary philosophical concepts and their new standards and their epistemological role in contemporary life, since they include new artistic and aesthetic values, it was more useful to take them in this research to understand the consistency between thought and art in the current era, and from that the motives of modernization are an approach at the hands of the first pioneers With their homeland of innovative methods in the contemporary artistic experience

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 15 2008
Journal Name
Iraqi Journal Of Agricultural Sciences 39 (2)‏
EFFICIENCY OF Trichoderma spp. ISOLATES IN ENHANCING SEEDS GERMINATION AND SEEDING GROWTH OF SOUR ORANGE‏
...Show More Authors

Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2019
Journal Name
Biochemical And Cellular Archives
Influence of chemical fertilizers and foliar spraying with humic acid in growth and yield of red cabbage
...Show More Authors

Scopus (6)
Scopus
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The use of modern management accounting systems for continuous improve the performance of Jordanian Industrial Companies
...Show More Authors

        The intensification of competition among all companies and at different levels has become necessary for every company need to continue to improve its performance in order to be able to face the competition and stay in the market. To achieve this, we must rely on the company's accounting information more accurate and appropriate and provided in a timely manner, for the purpose of use in planning and decision making.

So there must be information systems that help the administration to continuous development and improvement of the performance of companies in general, and this is what you need Jordanian companies, especially after the accession of Jordan to the field

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Al-adab Journal
Vocabulary of the modern Russian language from the point of view of stylistic diversity
...Show More Authors

Сатья посвящена выделению и описанию функциональных стилей русского языка. В работе будет предствлена стилистическая характеристика заимствованной лексики, которая в некоторых случаях заменяет собственно русские слова, что может приводить к затемнению смысла высказывания, эвфемизации его, кроме того, заимствования заполняют определенные стилистические книши, образовавшиеся в связи со структурны

... Show More
View Publication
Crossref
Publication Date
Tue Mar 31 2020
Journal Name
College Of Islamic Sciences
Ruling on conducting a marriage contract through modern means of communication Juristic study
...Show More Authors

 

This research dealt with highlighting the images of marriage through the modern means of communication and the legal ruling for it. Dowry even be knotted on them; because they are then one of the parties to the contract and contracted in one contract, and this is prohibited by law and law and common sense.

It turns out that it is permissible to advertise marriage through the Internet in accordance with the rules and standards that preserve values ​​and morals and safeguard dignity and chastity. The acts in Islamic law are vested with intentions. If intentions are true, then the act is true, and Internet marriage is what falls under this order.<

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The role of tourism in economic growth-outlook for the role of tourism in Iraqi marshes development.
...Show More Authors

The tourism activity is one of the pillars on which the economy of any country is based , the importance of the tourism sector is reflected in its potential to become an effective development alternative in many countries, especially Iraq ,this has a direct impact on the national economy as an important source in attracting hard currency and eliminating unemployment. Adding the Iraqi Marshlands to the list of effects makes it contribute to diversification of sources of income and stimulating rest of the economic sectors, the potentials and qualifications possessed by Iraq in the field of tourism and monuments have a significant impact on the state budget if they were exploited optimally. The research aims at identifying the contr

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue May 20 2008
Journal Name
Journal Of Planner And Development
Estimating Water Quality from Satellite Image and Reflectance Data
...Show More Authors

The useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables

View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref