Nearly, in the middle of 1970s the split-brain theory became the only theory that explains human creativity used in all fine art and art education schools. In fact, this theory- which appeared for first time in the middle of 1940s – faced many radical changes including its concepts and structures, and these changes affected both teaching art and art criticism. To update people awareness within art field of study, this paper reviews the split-brain theory and its relationship with teaching art from its appearance to its decay in 2013 and after.
The aim of this study is know the five leadership practices according to the theory of network of leadership by Black and Mouton for the presidents of the Taxation General Board from their prospective, that is through answering the questionnaire questions. To achieving the objectives of this study, the researcher organized a questionnaire form as a main instrument for data collection. It includes (30) items distributed into five leadership practices according to the theory of network of leadership. Each one is subdivided into (6) questions.
The questionnaire was distributed to the presidents of the Taxation General Board of (14). The researcher used the SPSS program to analyses the answers. Through the answers, h
... Show MoreThe current research aims at detecting Brain Dominance Learning Styles distinguished
and ordinary secondary school students (males and females).The researcher adopted Torrance
measure, known as ‘the style of your learning and thinking to measure Brain Dominance
Learning Styles’, the codified version of Joseph Qitami (1986); picture (a). The researcher
verified the standard properties of tool. The final application sample was 352 distinguished
and ordinary students; 176 distinguished male and female students and 176 ordinary male and
female students at the scientific fifth level of secondary school from schools in the province of
Baghdad, AL- KarKh Education Directorates in the First and Second . and who have been
Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreThere is no access to basic sanitation for half the world's population, leading to Socioeconomic issues, such as scarcity of drinking water and the spread of diseases. In this way, it is of vital importance to develop water management technologies relevant to the target population. In addition, in the separation form of water treatment, the compound often used as a coagulant in water treatment is aluminum sulfate, which provides good results for raw water turbidity and color removal. Studies show, however, that its deposition in the human body, even Alzheimer's disease, can cause serious harm to health and disease development. The study aims to improve the coagulation/flocculation stage related to the amount of flakes, i
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show More