Nearly, in the middle of 1970s the split-brain theory became the only theory that explains human creativity used in all fine art and art education schools. In fact, this theory- which appeared for first time in the middle of 1940s – faced many radical changes including its concepts and structures, and these changes affected both teaching art and art criticism. To update people awareness within art field of study, this paper reviews the split-brain theory and its relationship with teaching art from its appearance to its decay in 2013 and after.
Intellectual and material displacement is one of the design strategies through many mechanisms and means, and depends on the idea of changing the shape within the internal spaces at times and has concepts related to the transformation at other times. And represented by the boxes for travelers, the research problem emerged through the following question: (What is the effectiveness of displacement in the formal structures in the interior design of historical sites), and the aim of the study is to reveal the reality of the use of historical internal spaces and to determine the formal displacement that occurs as a result of change and transformation, and it included two topics, the first topic Transformation and the effectiveness of formal d
... Show MoreSince the emergence of the science of international relations as an independent academic scientific field, various theories and trends have appeared and have tried to understand and explain the international reality and give a clear picture of what is happening within the international system of interactions and influences and the search for tools for stability and peace in international relations. Among these theories is the feminist theory, which is a new intellectual trend on the level of international relations theories, which tried to give an explanation of what is happening in world politics and in international relations in particular. The main issue that feminist theory is concerned with is the lack of women’s subordination
... Show MoreA theoretical and protection study was conducted of the corrosion behavior of carbon steel surface with different concentrations of the derivative (Quinolin-2-one), namely 7-Ethyl-4-methyl-1-[(4-nitro-benzylidene)-amino]-1H-quinolin-2-one (EMNQ2O). Theoretically, Density Functional Theory (DFT) of B3LYP/ 6-311++G/ 2d, 2p level was carried out to calculate the geometrical structure, physical properties and chemical inhibition chemical parameters, with the local reactivity in order to predict both the reactive centers and to know the possible sites of nucleophilic and electrophilic attacks, in vacuum and two solvents (DMSO and H2O), all at the equilibrium geometry. Experimentally, the inhibition efficiencies (%IE) in (3.5% NaCl)
... Show MoreThis paper is concerned with introducing and studying the new approximation operators based on a finite family of d. g. 'swhich are the core concept in this paper. In addition, we study generalization of some Pawlak's concepts and we offer generalize the definition of accuracy measure of approximations by using a finite family of d. g. 's.
Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreThere is no access to basic sanitation for half the world's population, leading to Socioeconomic issues, such as scarcity of drinking water and the spread of diseases. In this way, it is of vital importance to develop water management technologies relevant to the target population. In addition, in the separation form of water treatment, the compound often used as a coagulant in water treatment is aluminum sulfate, which provides good results for raw water turbidity and color removal. Studies show, however, that its deposition in the human body, even Alzheimer's disease, can cause serious harm to health and disease development. The study aims to improve the coagulation/flocculation stage related to the amount of flakes, i
... Show More