Preferred Language
Articles
/
jcofarts-657
Performing processors of view between impressionism & superrealism (A comparative analysis): فريد خالد علوان
...Show More Authors

Addressed the problem of the research is marked: (Performing processors for the time between Impressionism and superrealism) the concept of time and how to submit artwork. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then determine the research objectives of (detection processors performing to the concept of time in works of art in each of Impressionism and superrealism. And a comparison between them to reveal similarities and differences), followed by the establishment of boundaries Find three (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizing of the subject. The researcher has identified three addresses implied within this framework to ensure reading placed search according to the various frameworks tariff. Were as follows: the concept of Performance. Performance in school Impressionism. Performance in motion superrealism. The third chapter was devoted to the search procedures, through thoughtful society and revealed the selected sample of it (4 boards) and then specify the search tool and determine the methodology, followed by an analysis of the sample. The fourth chapter included the search results, including:1. Impressionism was supposed high-resolution camera before its existence, this curriculum was adopted in technical work, while actually that superrealism benefited from its existence.2. Impressionism stop time and assume that appropriate selection flesh artist to documented, while The superrealism has stopped and select by artist to their appropriate moments, via the camera. What a dream by Impressionist artist, achieved artist superrealism, with the help of technology.3. Impressionist artist predicted the existence of details to Leave the eye, represents an intuitive manner, while the artist Alsobriala sensory seen through technical given that proved its existence.4. Impressionism is a performance act of imagination woven into the details of the decree scene. And Alsobrialah performance monitoring precise optical tubeless to the mental effort of the Impressionists

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (19)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Water Treatment With Conventional and Alternative Coagulants: A Review
...Show More Authors

There is no access to basic sanitation for half the world's population, leading to Socioeconomic issues, such as scarcity of drinking water and the spread of diseases. In this way, it is of vital importance to develop water management technologies relevant to the target population. In addition, in the separation form of water treatment, the compound often used as a coagulant in water treatment is aluminum sulfate, which provides good results for raw water turbidity and color removal. Studies show, however, that its deposition in the human body, even Alzheimer's disease, can cause serious harm to health and disease development. The study aims to improve the coagulation/flocculation stage related to the amount of flakes, i

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Fri Mar 23 2018
Journal Name
Entropy
Methods and Challenges in Shot Boundary Detection: A Review
...Show More Authors

View Publication
Scopus (65)
Crossref (59)
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (9)
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Cost Reduction and Sustainable Business Practices; A conceptual approach
...Show More Authors

An excellent reputation earned by initiating and practicing sustainable business practices has additional benefits, of which are reducing environmental incidents and an improvement in operational efficiency as this has the potential to help firms improve on productivity and bring down operating costs. Taken further, with ever-increasing socially and environmentally-conscious investors and the public alike, this act of natural resources management could have a significant implication on market value and income of the practicing firms.

The above proposition has been supported by sustainable business practices literature that is continuously conversing and deliberating upon the impact of efficient resource d

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Credit Card Fraud Detection Challenges and Solutions: A Review
...Show More Authors

     Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them.  This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c

... Show More
Scopus (14)
Crossref (16)
Scopus Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Iranian Journal Of Nursing And Midwifery Research
Girls’ Experiences Regarding Obesity: A Qualitative Study in Iraq
...Show More Authors
Abstract<sec> <title>Background:

Obesity among girls can cause physical, psychological, or social problems. Different cultures have different lifestyle and dietary habits which affect people’s experience about obesity. This study aimed to assess girls’ experience toward obesity.

Materials and Methods:

In 2023, a qualitative conventional content analysis method was used in this study to meet the study’s objective in Baghdad and Babylon, Iraq. A probability purposive sampling method was used to gather the sample from three high schools in t

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The extent of the contribution of internal marketing in the management of human talent survey study of the views of some administrative leaders at the University of Mosul
...Show More Authors

 Abstract

Investment in the human resource has become an important part of the strategies of educational organizations so that they can be competitive, so that the access of academics in universities to the international awards as a result of their research excellence indicates the effectiveness of this human talent so the interest has emerged in the implementation of a strategy to manage these human talent in organizations in general and educational ones In particular as one of the power sources  that can not be imitated. The focus of the organization on the interaction between the working people has increased attention to the human element in order to achieve the desired quality levels, which called for organi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref