Preferred Language
Articles
/
jcofarts-322
The impact of modern global art movements on Graphic Design
...Show More Authors

The significant shift in the Fine Arts, who led the avant-garde movements and creative which appeared in the modern, specifically in the mid-nineteenth century and early twentieth century era path, embodied in a clear show of new aesthetic value rejects traditional methods put in shape and color qualities She described the movements subjectivity or no formal, was intended to determine the direct function of expression and speech language in the visual arts away from the representation and simulation of reality was accompanied by the appearance of those fine movements directed towards a global approach to design carries features and clear in its organizations formalism of the most important move away from the symmetry and the adoption of rather than the system and attention to the job which was considered one of the basic principles of beauty and order to reach the roots of the global method in graphic design stages undergone by the design history, combined with Fine art avant-garde movements, In the most important historical era, appeared at the researcher problem and found worthy Find summed it up by asking follows what is the impact of modern art movements on graphic design in the modern age in determining the formal building and expressive attributes and achieve career goals aesthetic from here came the goal of research statement formalism and organizational variables for graphic designer and performance expressive and comparing methods affected artistic movements of the modern era. The research based on analytical descriptive approach to group samples came out of her with Group of conclusion : findings and conclusions, namely: contributed to modern art in creating standards performance today, a new process aesthetic design, which was limited to the aesthetic drawing and techniques to express them into a collage techniques and photo montage about metaphor expressive use of materials has not been touched before., To achieve the formal organization of the elements with the background, whether from during the mathematical logic and engineering or coincidence industry led to a shift in the design process and the emergence of new space relationship directly influenced in a clear transformation of the design

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 29 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
The impact of the internet of things on information institutions from the perspective of library employees
...Show More Authors

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
وزارة التربية العراقية
خوێندنەوەی کوردیی نوێ/ القراءة الكُردية الحديثة
...Show More Authors

Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Engineering And Applied Sciences
The role of e-Government on corruption and its impact on the financial performance of the government: An empirical analysis on the Iraqi government
...Show More Authors

This study aimed to provide a conceptual model for the use and benefits of the e-Government as related to administrative fraud and financial corruption. The study also looked into their concepts, forms, dimensions and types and the role of e-Government on fraud reduction, corruption in administration and finance and its impact on the government performance. From the result, it is revealed that there is need for electronic government for implementation in order to curb the rate of fraud and administrative and financial corruption and improve the quality of service provision for better performance

Scopus (16)
Scopus
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Design and Analysis WIMAX Network Based on Coverage Planning
...Show More Authors

In this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Multiple Intelligences on the Acquisition of Science Operations by Middle School Students of Arabic Grammar
...Show More Authors

The current research aims to identify the multiple intelligences in the fourth students’ acquisition of the literary processes of Arabic grammar and to identify the differences in multiple intelligence according to gender (males - females). The study was determined for students of the fourth literary preparatory Al-Hakim Preparatory (for males) and Rabat Preparatory (for females) of the Second Karkh Education Directorate, topics from the Arabic grammar subject (past tense, present tense, imperative, subject, and object) for the first semester of the academic year 2019-2020. The results showed that there were no statistically significant differences at the significance level (0.05) between the average scores of the students who were tau

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
An algorithm for binary codebook design based on the average bitmap replacement error (ABPRE)
...Show More Authors

In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Al-nahrain University-science
Global Stability of Harmful Phytoplankton and Herbivorous Zooplankton with Holling Type IV Functional Response
...Show More Authors

In this paper harmful phytoplankton and herbivorous zooplankton model with Hollimg type IV functional response is proposed and analyzed. The local stability analysis of the system is carried out. The global dynamics of the system is investigated with the help of the Lyapunov function. Finally, the analytical obtained results are supported with numerical simulation.

View Publication Preview PDF
Crossref
Publication Date
Tue Sep 10 2019
Journal Name
International Journal Of Science And Research
The Impact of Hydro-Politics on the Relation between Turkey and Iraq Since 1980
...Show More Authors

Water one of the most important sources Which is no doubt essential for life surviving, water is vital in many sectors of life e.g. ( agriculture, industrial, power and so many things can’t be restricted on the mentioned items, water has become major problem facing the world today. Competition over water resources between nations has made it as a vital commodity and a justification for waging wars against its neighbor’s countries, there are currently 263 rivers that either cross or demarcate international political boundaries. Geographically, Europe has the largest number of international basins (69), followed by Africa (59), Asia (57), North America (40), and South America (38).The absolute numbers of international basins, as well as t

... Show More
View Publication Preview PDF