The significant shift in the Fine Arts, who led the avant-garde movements and creative which appeared in the modern, specifically in the mid-nineteenth century and early twentieth century era path, embodied in a clear show of new aesthetic value rejects traditional methods put in shape and color qualities She described the movements subjectivity or no formal, was intended to determine the direct function of expression and speech language in the visual arts away from the representation and simulation of reality was accompanied by the appearance of those fine movements directed towards a global approach to design carries features and clear in its organizations formalism of the most important move away from the symmetry and the adoption of rather than the system and attention to the job which was considered one of the basic principles of beauty and order to reach the roots of the global method in graphic design stages undergone by the design history, combined with Fine art avant-garde movements, In the most important historical era, appeared at the researcher problem and found worthy Find summed it up by asking follows what is the impact of modern art movements on graphic design in the modern age in determining the formal building and expressive attributes and achieve career goals aesthetic from here came the goal of research statement formalism and organizational variables for graphic designer and performance expressive and comparing methods affected artistic movements of the modern era. The research based on analytical descriptive approach to group samples came out of her with Group of conclusion : findings and conclusions, namely: contributed to modern art in creating standards performance today, a new process aesthetic design, which was limited to the aesthetic drawing and techniques to express them into a collage techniques and photo montage about metaphor expressive use of materials has not been touched before., To achieve the formal organization of the elements with the background, whether from during the mathematical logic and engineering or coincidence industry led to a shift in the design process and the emergence of new space relationship directly influenced in a clear transformation of the design
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreThis study aimed to provide a conceptual model for the use and benefits of the e-Government as related to administrative fraud and financial corruption. The study also looked into their concepts, forms, dimensions and types and the role of e-Government on fraud reduction, corruption in administration and finance and its impact on the government performance. From the result, it is revealed that there is need for electronic government for implementation in order to curb the rate of fraud and administrative and financial corruption and improve the quality of service provision for better performance
In this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob
... Show MoreThe current research aims to identify the multiple intelligences in the fourth students’ acquisition of the literary processes of Arabic grammar and to identify the differences in multiple intelligence according to gender (males - females). The study was determined for students of the fourth literary preparatory Al-Hakim Preparatory (for males) and Rabat Preparatory (for females) of the Second Karkh Education Directorate, topics from the Arabic grammar subject (past tense, present tense, imperative, subject, and object) for the first semester of the academic year 2019-2020. The results showed that there were no statistically significant differences at the significance level (0.05) between the average scores of the students who were tau
... Show MoreIn this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show MoreIn this paper harmful phytoplankton and herbivorous zooplankton model with Hollimg type IV functional response is proposed and analyzed. The local stability analysis of the system is carried out. The global dynamics of the system is investigated with the help of the Lyapunov function. Finally, the analytical obtained results are supported with numerical simulation.
Water one of the most important sources Which is no doubt essential for life surviving, water is vital in many sectors of life e.g. ( agriculture, industrial, power and so many things can’t be restricted on the mentioned items, water has become major problem facing the world today. Competition over water resources between nations has made it as a vital commodity and a justification for waging wars against its neighbor’s countries, there are currently 263 rivers that either cross or demarcate international political boundaries. Geographically, Europe has the largest number of international basins (69), followed by Africa (59), Asia (57), North America (40), and South America (38).The absolute numbers of international basins, as well as t
... Show More