Preferred Language
Articles
/
jcofarts-686
Shift formal regulations on Mesopotamian pottery (Pottery Samarra model): محمد جاسم محمد العبيدي
...Show More Authors

Operated Alandziahih "drift theory" as a science talk in most of the cash and technical studies in the early twentieth century, making him and the sciences, arts and culture both fields of experiences, in an attempt to explore the institutions that theory, a number of laws which took control in the internal structures of those acts, resulting in for those institutions to be actively contribute their ideas to guide the pace on the right track. And thus lay the foundations of this theory, which was a big affair in the early twentieth century and still vigorous pace to this day, particularly their applications in various fields of the arts.Although each type of Arts, both in the composition or the theater or means of communication, took join the structure theory for you draw the structure and internal systems according to their own rules, but the modernity and beyond the weakening of the boundaries between the different arts races of non-premeditated, which I took the theoretical drawing new forms and institutions of helpfulness for change theory to the normal function of those technical races, which we have created that this theory is that the response to changes in the various arts structures, and this theory structures are pottery arts, and testing operations for that vocabulary for various Arts, from its beginnings and to the present time, whether mural paintings in caves, or pottery or sculptural works up to the architecture, and in response to developments of the changes caused by drift can adapt the artwork of any kind ((pottery, sculpture, mural)) and the process of recovery to those arts, and the process of expanding to accommodate those mechanisms theory and its applications on the pottery arts. And has managed the artist pottery to paint a model of the new theory, mechanisms and make use of its data, which annihilate the spirit of the artwork, and bear fruit from her tree, especially summon all that is old, towards the contemporary, and its we can achieve a kind of chaos, even the limits of control character Alanziahi on the artwork, which Taking captures those mechanisms by employing legibility, especially ancient pottery arts and everything that has a poetic performance of up to naivete and simplicity in technical her performances

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 10 2016
Journal Name
Scientific Reports
Experimental demonstration on the deterministic quantum key distribution based on entangled photons
...Show More Authors

As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based

... Show More
View Publication
Scopus (17)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Neuroquantology
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
الوجود الفلسطیني في لبنان وانعكاسات الازمة الفلسطینیة على الوضع اللبناني: الوجود الفلسطیني في لبنان وانعكاسات الازمة الفلسطینیة على الوضع اللبناني
...Show More Authors

Abstract:
The Palestinian existence in Lebanan is regard as active Arab powers
in political system in Lebanan. This existence arises exactly in Lebanan on 5 /
June / 1967. The Palestinians distributed from south to north, from Bayrouth

to Al-Bquaa, also they lived in Camps like (Tal Al-Zater), (Aen Al-hlwa, Mya –
Mya) and so on.
The armed Palestinian resistance breakout from these camps in
Lebanan against Israel, Lebanon rejected this conflict to avoid any
confrontation with Israel which have big military and high ability in different
aspects in addition security of Lebanan did not connected with security of
Arab states in other side the civil war which break out in Lebanon impact upon
Palestinians

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Unipolarity and Its Influences in American Foreign Policy and the Future International Relations: Unipolarity and Its Influences in American Foreign Policy and the Future International Relations
...Show More Authors

Abstract
The concept of unipolar has allowed the united states of America to
control the rest of the internations community units through the rxclusively of
control in international affairs without enabling other countries who have the
ability to compete with it to appear this comes as a result of it's position to all
kinds of powers like military, economic and technical powers that enable it to
continue dominating other countries, this superior control enabled it to be the
(hyper power) on the international political scene so that it allowed it to
exercise and implement the policy of domination against all this appeared
after its empire superiority became clear, in a unique way that have never
been known in

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 19 2004
Journal Name
Association Of Arab Universities Journal Of Engineering
تأثير وجود المحرمات على تنامي الفشل في المنحدرات
...Show More Authors

Publication Date
Sat Aug 10 2013
Journal Name
Journal Of Accounting And Financial Studies (jafs)
التهرب الضريبي واثره على التنمية الاقتصادية في العراق
...Show More Authors

Highlights the role of taxes in being a major source of funding sources internal economic and social development, and then, any decrease in tax revenue caused by tax evasion, for example, would weaken the government's ability to finance their investments and core financing private sector investment as a result of reduced ability to increase their reserves's cash banks, as well as the weakening of the effectiveness of tax evasion taxes as a tool to guide economic activity in the framework of service for development, and to achieve justice. And the statement of the reasons for and methods of evasion mandated to pay the tax due on them, whether legitimately or illegal with the statement of the proposed methods to tackle tax evasion and elimina

... Show More
Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Windows-Based Special Applications Router
...Show More Authors

The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 14 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
التهرب الضريبي واثره على التنمية الاقتصادية في العراق
...Show More Authors

Highlights the role of taxes in being a major source of funding sources internal economic and social development, and then, any decrease in tax revenue caused by tax evasion, for example, would weaken the government's ability to finance their investments and core financing private sector investment as a result of reduced ability to increase their reserves's cash banks, as well as the weakening of the effectiveness of tax evasion taxes as a tool to guide economic activity in the framework of service for development, and to achieve justice. And the statement of the reasons for and methods of evasion mandated to pay the tax due on them, whether legitimately or illegal with the statement of the proposed methods to tackle tax evasion and elim

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Image Hiding Using Discrete Cosine Transform
...Show More Authors

Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.

View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Body parts idioms; across-cultural significance
...Show More Authors

0

View Publication Preview PDF