The research current ( features tendency cosmic in contemporary Iraqi configuration) attempt to study the dimensions of the conceptual and philosophical foundations upon which the tendency of cosmic within the period that extended its influence beyond the place where I grew up to be circulated concepts in all parts of the world, it is no doubt that the world is now heading to rapprochement after the tremendous developments in the field of communication technology and reflected heavily on identity concepts, privacy, the concept of nation-states ... etc. to become an individual and a large area of access to other cultures, and all that aroused the interest of contemporary Iraqi artist this interest arising from the desire to keep up with developments in the world of developments at the level of ideas or at the level of their practical applications in the field of art. So promising researchers studied four chapters, the first chapter of it concerned with the methodological framework for the search represented research problem which is determined by answering the following two questions: - What are the features of the universal tendency that emerged in the products of contemporary art!? - Is it possible to identify those features and levels of formal and technical Alamadaminah artists Fine Iraqis across Mndzhm Fine!? The first chapter also included a goal Find a (detection features tendency cosmic in contemporary Iraqi art) The boundaries of research has been limited to the study of the features of the tendency of cosmic and analysis of pictorial models for artwork Iraqi contemporary in the time period (1990-2010) performed by artists Iraqis inside and outside Iraq The materials are different, then Chapter mentioned terminology entitled Find seal, either disconnect the second has included a presentation of the theoretical framework, which included three sections, the first of it (the concept of cosmic and privacy) and taking second section (features tendency cosmic in contemporary global Fine Arts), and display the third section (Find approaches between the contemporary global art and contemporary Iraqi Art) and ended Chapter indicators theoretical framework. Chapter III has specialized display research procedures in terms of monitoring the research community and information related to the selection of a sample of it deliberate manner, which amounted to (35) in accordance with Cecchelaa and by (4) models of the sample covered the limits Find the adoption of the descriptive approach and the way the descriptive analysis for the purpose of analysis. Chapter IV brought together the results of research and conclusions as well as recommendations and proposals, followed by the list of sources
The contemporary arts, including the graphic design art, adopted new concepts and methods that diverged from the customary rules of design, such as the method of irregularity, as a result of the art keeping up with the intellectual, scientific and technical developments that accompanied all fields of life which caused a problem in employing this technique because of its influence on the functional aspect of the graphic achievement. Hence, the researcher chose the title of the research entitled (the irregularity in contemporary graphic achievement) based on the following questions: a-Does the transformation of style in contemporary graphic design constitute a problem for the designs it produces?b- Has the contemporary graphic design achie
... Show MoreThis study, which is considered the first of its kind in the world and the Arab homeland, was carried out in the laboratory of mushroom production belonging to the Medicinal Plant Unit/ College Of Agricultural Engineering Sciences/ University of Baghdad during the period from July 21, 2016, to December 30, 2018, aiming to isolate and purify the mycelium of the wild isolation in addition to the genetic and morphological identification of the mushroom Agaricus bellaniae. The obtained pure isolation was tagged in the American National Center for Biotechnology Information (NCBI) with symbol MF987843.1, thus Iraq would be the second country in the world in which the mushroom is grown following the United States of America. The
... Show MoreMethods: 112 placentae samples were investigated during the period from August 2007 to August 2008 under light microscopefor mother aged 15 - 45 years old.Results: It was found that normal placental shapes had no correlation to mother age, while abnormal shapes were found more inyoung age groups. The better placental measured parameters were found in mother age 20-24 years. The percentages ofabnormal umbilical cord insertion were very high compared to other studies. Babies’ gender had a correlation with theplacental thickness; male babies have thicker placentae than females. Male babies have longer umbilical cords with widerdiameter than females. Light microscope picture showed the chorionic villi with isolated fetal blood vessel were hig
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreCorruption (Definition , Characteristics , Reasons , Features , and ways of combating it)
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreIn this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.