Between decline and appearing dichotomy, art history comes to announce birth of an era that glories past and find new names that are emerged from yearning to past and represented by neo-classical, By refusing the previous approaches and create topics that touché culture and derived from it through s revitalizing ideal beauty standards. One of neo-classical artists, who tried to simulate the classical works, is (Jean-Auguste-Dominique Ingres), who put framework for semantic aesthetic of the art form by revitalizing past glories and deeply searching myths and cultures through finding special artistic features that emphasizes artist own stylistics and identity. This research studies artistic features of women form in (Jean-Auguste-Dominique Ingres) works as he occupied a distinct space in global configuration, cannot be underestimated or neglected. He was marked by his interest to implement variant topics that are related to women. Hence, the study introduced women form in his works and then revealing some of their features, accordingly this paper consists of four chapters: The first comprises paper problem through rising the following questions: 1.Does the artist (Ingres) experience has artistic features distinct women form in his works?2.What is the environment impact in guiding artist style and determining women form features? The second chapter includes theoretical framework and comprises three topics: high-class women, women form in topics with myth characteristic, and Eastern women. The third chapter comprises paper procedures, While The fourth chapter was devoted to show researcher results according to paper objectives
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreAceclofenac (AC) is an orally active phenyl acetic acid derivative, non-steroidal anti-inflammatory drug with exceptional anti-inflammatory, analgesic and antipyretic properties. It has low aqueous solubility, leading to slow dissolution, low permeability and inadequate bioavailability. The aim of the current study was to prepare and characterize AC-NS-based gel to enhance the dissolution rate and then percutaneous permeability. NS.s were prepared using solvent/antisovent precipitation method at different drug to polymer ratios (1:1, 1:2, and 1:3) using different polymers such as poly vinyl pyrrolidone (PVP-K25), hydroxy propyl methyl cellulose (HPMC-E5) and poloxamer® (388) as stabilizer
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreAmongst the literary writers who used their art to direct the attention towards the issue of woman and her rights in a proper life is the English poet and novelist Thomas Hardy (1840-1928), who has been praised for his “openness to the feminine principle” 1 as Irving Howe put it. Hardy’s wide readings have changed his way of dealing with and thinking about so many critical issues which started to float on the surface of the English society during the mid and late of the 19th century. His readings for a number of writers, who seem of huge impact on his writings as he later admits that – “[his] pages show harmony of view with
... Show MoreAbstract
Itraconazole is a triazole antifungal given orally for the treatment of oropharyngeal and vulvovaginal candidiasis, for systemic infections including aspergillosis, candidiasis, and for the prophylaxis of fungal infections in immunocompromised patients.
The study aimed to formulate a practical water-insoluble Itraconazole, with insufficient bioavailability as nanosuspension to increase aqueous solubility and improve its dissolution and oral bioavailability.
Itraconazole nanosuspension was produced by a
... Show MoreThis research reveals the treatment mechanisms followed in the media for covering the topic of displacement and captivity of Yazidi in the Iraqi press, through studying all the publishing in one of the Iraqi newspapers concerning the research subject. The research problem is in the following questions:
- What are the journalistic arts that are tackled by the newspaper concerning the subject of the Yazidi women?
- What are the editing forms for the model of the press subjects that have been employed about the event and what are its sources?
- What are the highlighting means used in presenting the subjects within the journalistic arts?
- What are the i