Preferred Language
Articles
/
jcofarts-206
The structure of design and technology in the contemporary design in the interior spaces
...Show More Authors

The design of the interior spaces process the product of intellectual civilization expresses the prevailing thought, discoverers of principles and beliefs through the sheen reflects the present, and generating languages ​​graphical variety caused a different revolution in design mounting structure, and because of the complex nature of the interior spaces were and we have to be a reflection of cultural reality of being a form of cultural expression and true embodiment of scientific developments prevailing for each stage where she was born, the changes occurring in human thought and then extremism and the discrepancy tastes among individuals all communities factors have caused a change in the design structure involving modernization and down towards the contemporary technology and this is what was called search his address and the importance of modernization as a concept evolutionary as well as related concepts down to determine the importance of modern technology as an influence in building structure design, and by clarifying the behaviors that concept to enable the search to identify the research problem by asking the following: Are contemporary technology works as an influence in the formation of structure design interior spaces? The objective of the research: to identify the importance of modern technology as an influence in building structure design. The second chapter included the theoretical framework, which contained a statement of the concept of technology and contemporary concept. This statement, along with the contemporary style of relationship and modernization as well as touched upon some of the concepts put forward by the technology, and technology between the art and the path of civilization. And ensure that the third chapter research procedures in terms of methodology and the research community, and the research sample intentionality, then elected modeling analysis, and finally the fourth quarter included the findings of the search after the analysis process, and then conclusions with suggestions and recommendations.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 15 2021
Journal Name
Al-academy
The effectiveness of media communication and its problems in the contemporary theatrical presentation: راسل كاظم عوده-سلمان خلف حسين
...Show More Authors

The theater can be considered a media that the effectiveness of its tools and the perceptions it produces cannot be abandoned according to patterns or aesthetic artistic trends, and at the same time it carries a large amount of information that can be worked on activating it with conscious directions within the elements of the theatrical performance, and these can be counted The study is an attempt to trace the functioning of the communication and media elements in the structure of the theatrical performance, as the study included: An introduction that defines the research problem and its importance, which crystallized around the following question: Does the media communication through theatrical presentation form its desired effectivene

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Retreat and the science of speech Contemporary reading
...Show More Authors

However, the effects of these ideas are still evident
Think of those who follow the footsteps of Muslim scholars and thinkers.
Intellectual source of Gnostic Gnar
And in dealing with issues of Islamic thought
Annalisa intersecting trends of thought, Minya who melts in Masarya and supported him and believes in Bo and extremist Vue,
 Lea, trying to throw it with a few times, looks at Elya look
There are those who stand in the opposite position
There are those who stand in a selective compromise, but this school of thought remains
 G - the features of Islamic thought that believes in the mind and Imoto in the defense of
An intellectual station and generalized bar
Creed. In his study, the researcher wi

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Safety Research
Analysis of prevention through design studies in construction: A subject review
...Show More Authors

View Publication
Scopus (21)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Use of Nondestructive Evaluation Technology in the Rationalization of costs: An Application In Baghdad Soft Drinks Company " Private Contribution"
...Show More Authors

Big developments in technology have led to upset the balance of ideas, given of its own post new properties for products not provided by traditional technology, especially economic units operating within the industrial sector, and therefore it is important to develop the Iraqi industrial sector and interest to do its vital role in light Of progress technological, and the cost accounting has benefited from this technology to development its goals in the regulatory process through the use of non-destructive evaluation perspective in carrying out its functions and to provide appropriate assistance for the use of the products, which were traditional accounting does not take them into consideration. The research aims to a statement that the u

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
The Impact of Operating System on Bandwidth in Open VPN Technology
...Show More Authors

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Research In Social Sciences & Humanities
The Role of Human Resources Management Professionals' Skills in Information Technology
...Show More Authors

The current research aims to measure the impact of the skills of human resources management professionals in information technology in Iraqi private banks, as the skills of human resources management professionals constitute the modern trend of banks' interest in employees with outstanding performance, and the presence of information technology in banks is a prerequisite for dealing with the huge amount of data. And converting it into information to support the decision-maker in light of a complex environment, and the field research problem was the presence of a clear lack of interest in the skills of human resource management professionals and the weak adoption of information technology, which was reflected negatively on the compet

... Show More
View Publication
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Design of PV Solar Energy Generator using MPPT Technique to Control Single Input/Multiple Outputs (DC-DC) Converter
...Show More Authors

The paper presents the design of a system consisting of a solar panel with Single Input/Multiple Outputs (DC-DC) Buck Converter by using Simulink dialogue box tools in MATLAB software package for simulation the system. Maximum Power Point Tracking (MPPT) technique depending on Perturb and Observe (P&O) algorithm is used to control the output power of the converter and increase the efficiency of the system. The characteristics of the MSX-60 PV module is chosen in design of the system, whereas the electrical characteristics (P-V, I-V and P-I curves) for the module are achieved, that is affected by the solar radiation and temperature variations. The proposed design module has been found to be stable for any change in atmospheric tempera

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 27 2023
Journal Name
Journal Of Global Innovations In Agricultural Sciences
The use of remote sensing technology in defining the water depth in the lakes and water bodies: Western Iraq as a case study
...Show More Authors

The study's primary purpose is to explore an appropriate way of monitoring and assessing water depths using the satellite remote sensing technique of the Al Habbaniyah Lake in Iraq. This research studied the experience-conditions (thresholds) of different bands for multi-temporal satellite image data with different satellite image sensors (Landsat 5-TM, and EO1-ALI) for the same region, to recognize regions of water depths. The threshold values are taken that to separate the Al Habbaniyah Lake to the required depths (shallow, deep, and very deep), as a supervised method. A three-dimension feature space plot had used to represent these regions. The relationship of the mean values of the three separated water regions with all TM and A

... Show More
View Publication
Scopus (1)
Scopus Crossref