The problem with research in the question of whether art forms in the religious icon Byzantine, heiress docility and tradition craftsman arts civilizations of the above? ... And if you are well, you helped a quotation on the entry of strange ideas rampant within religious traditions, and are prompted to do Movement rejected prohibition, and the outbreak of the icons war? ... Or is it, in fact - and as researcher finds - the result of a need communication between the religious and the recipient organization in the establishment of a deliberative speech, be visible, along with reading it and audible? .. And lies the importance of this study is being added technical knowledge of the library that will enrich researchers and scholars in this field and students of art colleges and institutes, interested in studying the history of art, and painting iconic in the Middle Ages in particular. The second chapter is divided into three Investigation; accept the first of the formal output of the Byzantine icon, the second section about art schools Byzantine icon. The third, in the terms of reference of examining a Byzantine icon. In the third chapter was selected models are deliberate analysis where adopted the descriptive analytical method, and of which there were three samples after the completion of the analysis the researcher to a range of outcomes, including: tends general approach toward simplification and reduction, after it was with the beginnings of a realistic then turned reported in maturity toward abstraction. Also characterized by a relatively small sizes, and repeating the first school model. Embodied the eastern Byzantine icon of theological thought (Orthodox). Sticking Almusbandh.jmoud manner of expression in specific templates. And get away and be careful not to highlight the details of the naked body. In addition to not - or scarcity - the use of popular iconography Palmruyat subjects
This research after financial ratios in the detection of fraud to the financial statements published which enables specialists from the work of their studies and their conclusions to obtain the information they seek on the activities of the entity. Has provided researchers what these relics They then field study to test the validity and sincerity of the findings of the suggestions that have been upheld the need to study all financial ratios extracted in general, organized and used in decision-making processes necessary administrative.And that the financial management attention more financial analysis and extraction of financial ratios and compare them with industry standards taken from historical norms
إحدى أهم الطرق لتقصي توزيع المجرات عبر الزمن الكوني هي دالة اللمعان LF بدلالة كتلة القرص الباريوني ψS(Mb)، القدر . لقد درسنا تقديرًا لكثافة كتلة الباريون في عينة من المجرات الحلزونية القضيبية وغير القضيبية من الادبيات السابقة، والتي تتضمن فعليًا، لكل صنف من الاجرام السماوية ذات المحتوى الباريون المرئي، جزءًا لا يتجزأ من ناتج دالة الضيائية (LF) ونسبة الكتلة إلى الضوء. استخدمت تقنية الانحدار المتعدد لحزمة الب
... Show MoreThe subject of improving the performance of services provided by government institutions of the important topics at the present time because of their direct contact at the service of citizens and the increased importance of these units as a result of the diversity of activities performed by the so governments of the countries and their people made sure to pay attention to the good use of those allocated to those sectors of resources and spending in the service prescribed and manage the highest level of efficiency and effectiveness and monitor the proper management of the money used in those sectors and evaluate their performance through the Supreme Audit Institutions so that they can play their role oversight and contribute to th
... Show MoreThe transformational leaderships in all organizations consider Motivations policies which is one of the main and basic policies adapted by the successful leaderships in all organizations, in order to be able to achieve essential goals, such as enhancing loyalty of employees towards their organizations and also developing and empowering their capacities and abilities in work, leading to development and increasing productivity and reducing production costs to the minimum, then reaching immense profits and benefits, in addition to development of excellence in the market of competition.
The research was performed in the (General Company of Leather Industries/ in Baghdad ,in alkarada) the study reached
... Show MoreAbstract:
This tribe had lived in Iraq since the first century A.D. Persia tried to
keep this tribe away from Iraq, but without result. The tribe managed to get
victory against Persia in the battle of Dhyqar.
When the Muslims had come to conquer Iraq, Rabi’a welcomed them
and takes part in that action.
That tribe helped the caliph Ali in the Jammal and Sifffen wars in order
to remain Iraq the center of the Islamic caliphates this tribe had felt very sad
and sorrowful when the caliphate become to the Umayyad . This tribe did not
give up, so this tribe did what could be done to help those who had revolted
against the Umayyad. Rabi’a did that in order to get ride of the Mudriat alsham,
and favored Rabi
The aerodynamic characteristics of general three-dimensional rectangular wings are considered using non-linear interaction between two-dimensional viscous-inviscid panel method and vortex ring method. The potential flow of a two-dimensional airfoil by the pioneering Hess & Smith method was used with viscous laminar, transition and turbulent boundary layer to solve flow about complex configuration of airfoils including stalling effect. Viterna method was used to extend the aerodynamic characteristics of the specified airfoil to high angles of attacks. A modified vortex ring method was used to find the circulation values along span wise direction of the wing and then interacted with sectional circulation obtained by Kutta-Joukowsky the
... Show MoreThe aim of this paper is to measure the characteristics properties of 3 m radio telescope that installed inside Baghdad University campus. The measurements of this study cover some of the fundamental parameters at 1.42 GHz. These parameters concentrated principally on, the system noise temperature, signal to noise ratio and sensitivity, half power beam width, aperture efficiency, and effective area. These parameters are estimated via different radio sources observation like Cas-A, full moon, sky background, and solar drift scan observations. From the results of these observations, these parameters are found to be approximately 64 K, 1.2, 0.9 Jansky, 3.7°, 0.54, and 3.8 m2 respectively. The parameters values have vital affect to quantitativ
... Show MoreA two-dimensional computational study had been performed regarding aerodynamic forces and pressures affecting a cambered inverted airfoil, CLARK-Y smoothed with ground effects by solving the Reynolds-averaged Navier-Stokes equations, using the commercial software COMSOL Multiphysics 5.0 solver. Turbulence effects are modeled using the Menter shear-stress transport (SST) two-equation model. The negative lift (down-force), drag forces and pressures surface were predicted through the simulation of wings over inverted wings in different parameters namely; varying incidences i.e. angles of attack of the airfoils, varying the ride hide from the ground covering various force regions, two-dimensional cross-section of the inverted front wings to be
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show More