The research current ( features tendency cosmic in contemporary Iraqi configuration) attempt to study the dimensions of the conceptual and philosophical foundations upon which the tendency of cosmic within the period that extended its influence beyond the place where I grew up to be circulated concepts in all parts of the world, it is no doubt that the world is now heading to rapprochement after the tremendous developments in the field of communication technology and reflected heavily on identity concepts, privacy, the concept of nation-states ... etc. to become an individual and a large area of access to other cultures, and all that aroused the interest of contemporary Iraqi artist this interest arising from the desire to keep up with developments in the world of developments at the level of ideas or at the level of their practical applications in the field of art. So promising researchers studied four chapters, the first chapter of it concerned with the methodological framework for the search represented research problem which is determined by answering the following two questions: - What are the features of the universal tendency that emerged in the products of contemporary art!? - Is it possible to identify those features and levels of formal and technical Alamadaminah artists Fine Iraqis across Mndzhm Fine!? The first chapter also included a goal Find a (detection features tendency cosmic in contemporary Iraqi art) The boundaries of research has been limited to the study of the features of the tendency of cosmic and analysis of pictorial models for artwork Iraqi contemporary in the time period (1990-2010) performed by artists Iraqis inside and outside Iraq The materials are different, then Chapter mentioned terminology entitled Find seal, either disconnect the second has included a presentation of the theoretical framework, which included three sections, the first of it (the concept of cosmic and privacy) and taking second section (features tendency cosmic in contemporary global Fine Arts), and display the third section (Find approaches between the contemporary global art and contemporary Iraqi Art) and ended Chapter indicators theoretical framework. Chapter III has specialized display research procedures in terms of monitoring the research community and information related to the selection of a sample of it deliberate manner, which amounted to (35) in accordance with Cecchelaa and by (4) models of the sample covered the limits Find the adoption of the descriptive approach and the way the descriptive analysis for the purpose of analysis. Chapter IV brought together the results of research and conclusions as well as recommendations and proposals, followed by the list of sources
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreCorruption (Definition , Characteristics , Reasons , Features , and ways of combating it)
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreIn this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.
This study, which is considered the first of its kind in the world and the Arab homeland, was carried out in the laboratory of mushroom production belonging to the Medicinal Plant Unit/ College Of Agricultural Engineering Sciences/ University of Baghdad during the period from July 21, 2016, to December 30, 2018, aiming to isolate and purify the mycelium of the wild isolation in addition to the genetic and morphological identification of the mushroom Agaricus bellaniae. The obtained pure isolation was tagged in the American National Center for Biotechnology Information (NCBI) with symbol MF987843.1, thus Iraq would be the second country in the world in which the mushroom is grown following the United States of America. The
... Show MoreHowever, the effects of these ideas are still evident
Think of those who follow the footsteps of Muslim scholars and thinkers.
Intellectual source of Gnostic Gnar
And in dealing with issues of Islamic thought
Annalisa intersecting trends of thought, Minya who melts in Masarya and supported him and believes in Bo and extremist Vue,
Lea, trying to throw it with a few times, looks at Elya look
There are those who stand in the opposite position
There are those who stand in a selective compromise, but this school of thought remains
G - the features of Islamic thought that believes in the mind and Imoto in the defense of
An intellectual station and generalized bar
Creed. In his study, the researcher wi
. The concepts of structural flexibility became one of the important goals in the design phases to reach high performance in architecture. The pioneering projects and ideas that linked architecture with technologies and scientific innovations appeared, with the aim of reaching projects that mix the concepts of flexibility with the development of machine thought and modern technology to meet the functional, environmental, and aesthetic requirements for human wellbeing. The aim of this paper is to identify the mechanisms used in order to reach flexible structural systems capable of accommodating technological changes and developments. The research hypothesizes that the structural design according to the concepts of flexibility achieves high s
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More