The current study entitled (the influence of heritage in the ceramic sculpture of the America Potter Paula Rice)
The study is based on four chapters:
Chapter I included structural find of clarification of the research problem and its importance, also included a mention of the research limits and the aim of this study, which is:
-Identify sculptures Ceramic affected ranges for Potter Paula Rice civilization heritage of intellectual and artistic, whether global or local.
-Trying to detect and intellectual influences the formalism of inherited and which resulted in the latest version of the unfinished ceramic artist.
-Did the artist callback method to the values inherent succeeded in the embodiment of the meaning of originality according to the wording of the creative and compatible and contemporary taste. :
Chapter II combine theoretical framework in three axes
The first axis: heritage
The second axis: contemporary ceramic composition
The third axis: the terms of reference of the American Ceramic
This chapter also included mentions the most important indicators that resulted in her detective theory.
Chapter III included search procedures and the method used in the descriptive analysis according to the axes learned analytical researcher.
Chapter IV was to clarify the results learned by the researcher of the study samples and analysis results have been on the whole appear affected in the cultural historical legacy, the environment and the ideas contemporary philosophical and the modern art movements in addition of personal representation of individual self, which verify the concept of originality in art and then accommodate inherited values and put a new format made the concept of individual artistic identity for the Potter Paula Rice.
Background: The incisive canal is an anatomical structure with an important location in the anterior maxilla, analyzing this canal and its relation to the bone anterior to the canal is necessary during dental implant. Aim of this study is evaluated effect of gender, age and tooth loss in area of maxillary central incisors teeth on the dimensions of incisive canal and buccal bone anterior to the canal using spiral computed tomography. Materials and Methods: Sample consists of prospective study for 156 subjects for both gender, they divided into two groups, 120 dentate group (60 male and 60 female) with age ranging from (20-70) and 36 edentate group (with missing maxillary central incisors) (18 male and 18 female) with age ranging from (50-70
... Show MoreThe global trend towards the use of fair value accounting is increasing, so the current study aimed to maximize the impact of fair value application on achieving relevance and representation faithfulness of accounting information in accordance with the common conceptual framework. To achieve the objective of this study, the researcher has determined in the theoretical framework the relationship of fair value with the characteristics of relevance and representation faithfulness of accounting information and the extent of achieving these characteristics, as well as conducting a field study by preparing a questionnaire distributed to a sample of academics (50) and auditors (50) with a total number of selected participants (100) of acad
... Show MoreThis paper presents a three-dimensional Dynamic analysis of a rockfill dam with different foundation depths by considering the dam connection with both the reservoir bed and water. ANSYS was used to develop the three-dimensional Finite Element (FE) model of the rockfill dam. The essential objective of this study is the discussion of the effects of different foundation depths on the Dynamic behaviour of an embanked dam. Four foundation depths were investigated. They are the dam without foundation (fixed base), and three different depths of the foundation. Taking into consideration the changing of upstream water level, the empty, minimum, and maximum water levels, the results of the three-dimensional F
The impact of mental training overlap on the development of some closed and open skills in five-aside football for middle school students, Ayad Ali Hussein, Haidar Abedalameer Habe
This research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche
... Show MoreThe emergence of mixed matrix membranes (MMMs) or nanocomposite membranes embedded with inorganic nanoparticles (NPs) has opened up a possibility for developing different polymeric membranes with improved physicochemical properties, mechanical properties and performance for resolving environmental and energy-effective water purification. This paper presents an overview of the effects of different hydrophilic nanomaterials, including mineral nanomaterials (e.g., silicon dioxide (SiO2) and zeolite), metals oxide (e.g., copper oxide (CuO), zirconium dioxide (ZrO2), zinc oxide (ZnO), antimony tin oxide (ATO), iron (III) oxide (Fe2O3) and tungsten oxide (WOX)), two-dimensional transition (e.g., MXene), metal–organic framework (MOFs), c
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t