Preferred Language
Articles
/
jcofarts-1264
Pioneering and Growth of Plastic vision data in Modern Art
...Show More Authors

The achievements of the art that we know today are questioned in motives that differ from what art knew before, including dramatic artistic transformations, which he called modern art.
In view of the enormity of such a topic, its ramifications and its complexity, it was necessary to confine its subject to the origin of the motives of the transformations of its first pioneers, and then to stand on what resulted from that of the data of vision in composition and drawing exclusively, and through exploration in that, we got to know the vitality of change from the art of its time.
And by examining the ruling contemporary philosophical concepts and their new standards and their epistemological role in contemporary life, since they include new artistic and aesthetic values, it was more useful to take them in this research to understand the consistency between thought and art in the current era, and from that the motives of modernization are an approach at the hands of the first pioneers With their homeland of innovative methods in the contemporary artistic experience

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 19 2018
Journal Name
Al-academy
Domination and motivation in Mona Saudi sculptures
...Show More Authors

This research is the subject of "Domination and Motivation in the Sculptures of Mona the Saudi" to the study of an accomplished Arab sculptor with its varied sculptural activity between the works of the exhibition and the works of the squares, as well as its distinguished place among the contemporary Arab sculptors. This research is divided into four chapters:

     The first chapter deals with the general methodological framework of the research in terms of the research problem which is focused on the question: What is the hegemony and motivation in the sculptures of Mona Saudi? The importance of research and the need for it, including the technical scientific material concerned with the sculptural achievement of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 02 2025
Journal Name
Applied Computing And Informatics
WisdomModel: convert data into wisdom
...Show More Authors

Scopus (3)
Scopus
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Efficiency of public investment spending and its impact on economic growth in Iraq For the period 2003- 2013
...Show More Authors

Occupy public investment spending, a great deal of attention since the thirties of the last century, to play important role in economic and social development process and therefore most of the countries are trying different degree of economic development to the completion of the largest amount of public investment, especially in infrastructure, which is one of the pillars essential to economic development, and in order to maximize utilization of the completion of public investment should focus on achieving efficiency in completion.
    The current reality of public projects in Iraq, indicating the absence of several key characteristics that must be provided if these proje

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
A Proposed Strategy to Develop Postgraduate Studies at King Khalid University to Support the Achievement of the Kingdom's 2030 Vision
...Show More Authors

Abstract

The aim of this research is to formulate a proposed strategy for developing graduate studies at King Khalid University to support the achievement of the Kingdom's vision (2030). The research used the descriptive survey approach. The research community consisted of all graduate students at King Khalid University. The research was conducted on a random sample included (623) Male and female students, this research relied on the questionnaire as the main tool for collecting its data. The results revealed that the research sample believes that all the proposals included in this research are very important for the development of postgraduate studies at King Khalid University to support the achievement of the K

... Show More
View Publication Preview PDF
Publication Date
Thu May 18 2023
Journal Name
College Of Islamic Sciences
Human right rule in self-defense And its prohibitions in Islamic jurisprudence
...Show More Authors

God, may He be glorified and exalted be He, has given every human being the right to life and a dignified life, and has warned against transgression against any of its sanctities without a legitimate right. No one, regardless of his status or authority, can deprive a person of his rights that the Sharia came to preserve, and whoever does that has declared all people to war, as all humanity is in solidarity. In raising the hand that is simplified to harm a person and oppress him unjustly and exalted in the land.
If this is the case, the Sharia came to establish the right of people, groups and individuals, to defend their sanctities, preserve their security, recover their usurped rights, repel the aggression of the aggressors, and oppre

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
2nd International Conference On Mathematical Techniques And Applications: Icmta2021
Review of clustering for gene expression data
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Wed Jan 23 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Active Role of Admin strative Skills in Reinforcing Strategic Entrepreneur Ship Through Organizational Flexibility: دراسة استطلاعية لأراء عينة من الإدارات العليا والوسطى في المصارف العراقية الخاصة / بغداد
...Show More Authors

The study has tackled three important variables on the strategic and organizational level, that are : (Administrative skill, strategic Entrepreneurship  and organizational flexibility). Through the statistical analysis is, the research hers have sought to identify the relation among them. The study has been applied on a sample of (44) private banks in Iraq. A questionnaire, which has been designed according to a number of international standards, has been used. It's made of (29) items that cover the three variables to test their hypotheses. A number of statistical tools have been used A number of conclusion have been reached and recommendations have also been suggested.

View Publication Preview PDF
Crossref
Publication Date
Wed Aug 25 2021
Journal Name
2021 7th International Conference On Contemporary Information Technology And Mathematics (iccitm)
Anomaly Detection in Flight Data Using the Naïve Bayes Classifier
...Show More Authors

View Publication
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref