Preferred Language
Articles
/
jcofarts-715
Harmonization formative in the design of interior spaces Hall of discussions in the design department (a model): بدريا محمد حسن فرج
...Show More Authors

Can not reach a comprehensive concept for interior design through the use of Harmonization term according transformations experienced by the terms of the variables associated with the backlog of cultures that characterize concepts according to the nature of the users of the spaces in the design output, which necessitates the meaning of the combination of knowledge, art, science, such as the type of perceptions design the Harmonization cognitive science with art to create products of the use of design configurations that help the designer to put such a product within the reality and like the fact that reliable, as well as the rational knowledge tend somehow to the objective specifically in facilitating the substance subject to perceptible on according to content and content design, note The interior design is based on the founding actors structure are the functional requirements, and the vision aesthetic, which depends Referents on different visions of the concepts of variety to produce vocabulary and configurations constituent differentiate its methods within the local technical capacity and cultures that impose the starting of which designs, so ensure Thread affordable four Brief chapters on according to research conditions, in the first chapter has been addressing the problem of research and justifications choice through goal setting and emphasize the importance that we listed in our class this with the reference in paragraph terminology to the Harmonization configuration, The second chapter was limited to the first two sections Harmonization formative eating, and the second topic dealt with design the spaces - discussions, and then the indicators that emerged from the researcher, while the third chapter research procedures in determining the sample through a process description and logical analysis, has been a researcher in the fourth quarter has sought to come up with results and conclusions in line with the content of the goal with the introduction of authorized sources, and in the What follows ask for some:- Characterized by the appearance of space design and content of the formative in terms of intellectual trends in the main space is divided into two principal two spaces: the first is intended for teachers and discussants supervisor professor and researcher, and the second is dedicated to attend through redundancy in the design layout.Involve the treating idea of Spaces and them Determinants on duplicates training depending on the nature of the design, which required so privacy design solutions

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Audit of accounting disclosure for potential liabilities and contingent obligations In light of the Corona pandemic and its reflection on the auditor's opinion: Applied research in the National Insurance Company
...Show More Authors

Abstract:

                The research aims to identify how to audit potential liabilities and contingent liabilities in light of the pandemic and its reflection on the auditor's report. The research problem is represented by the complexity of the process of checking potential liabilities and contingent liabilities in insurance companies, which was negatively reflected in the auditor's neutral technical opinion. The researchers hypothesize that auditing potential liabilities and contingent liabilities in light of the Corona pandemic is positively reflected in the auditor's report. The research concludes that the process of checking potential liabilities and contingent liabilities is

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The impact of the use of digital marketing channels on the implementation of the strategy of positioning Applied study on a sample of the managers of the International Company for smart card "Key Card"
...Show More Authors

 The technology in continuous and quick development, that reflects in all parts of our life and interred both scientific and practical fields. Marketing is one of them, a customer’s way to deal with choosing and demanding the product deferent from the traditional way. Some of the buying processes are electronic now, therefore the current research is identifying the digital channels that entered the world of marketing and influenced the activities and types that fall under this name and how it affects in positioning strategy, which is how to install the product or brand in the mind of the customer and was dimensions (brand identity, brand personality, brand communication, brand awareness, brand image), The researcher took t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 30 2021
Journal Name
مجلة العلوم القانونية
مسؤولية وزارة الداخلية عن اعمال منتسبيها ـ دراسة مقارنة
...Show More Authors

يتناول البحث مدى المسؤولية المدنية المترتبة على وزارة الداخلية عن اعمال منتسبيها

Preview PDF
Publication Date
Mon Sep 25 2023
Journal Name
Arab Science Heritage Journal
مرويات الإمام محمد بن علي الباقر ( ) في الغسل في كتب
...Show More Authors

The research titled (narrations of Imam Muhammad bin Ali al-Baqir (upon him be peace) about washing, in the four books of Sunan - study and analysis -) deals with what was reported from the noble and purified hadiths about him, peace be upon him, through the four hadith works represented by Sunan Abu Dawud (d. 275 AH). And Al-Jami’ Al-Kabir (Sunan Al-Tirmidhi) (d. 279 AH), Sunan Al-Nasa’i (Al-Mujtaba) (d. 303 AH), and Sunan Ibn Majah (d. 273 AH), who is the venerable imam and jurist from the House of Prophethood, as he transmitted many traces from the Prophet, may God bless him and grant him peace. Upon him and his family, peace be upon him. The study focused on his narrations, including the rulings on washing

View Publication Preview PDF
Publication Date
Wed Jan 21 2026
Journal Name
Journal Of The Iraqi University
THE ROLE OF STRATEGIC AMBIGUITY IN BUILDING THE CUSTOMER’S MENTAL IMAGE: AN EXPLORATORY RESEARCH IN THE NATIONAL INSURANCE COMPANY
...Show More Authors

View Publication
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of performance of some industrial companies In the default reference comparison method Field study in the public companies of cement (Iraqi - North - South
...Show More Authors

The increasing Global Competitive and the continuous improvement in information technology has led the way to the development of the modern systems and using modern techniques. One of these techniques is benchmarking style and Total Quality Management all of them are used to improve the production process and target rid from the losts on the other side.

The Benchmarking style has become a very important for all the industrial systems and the serving systems as well. And an instrument to improve their performance specially those which are suffering from the highness of the costs or waste in time on the other side.

This study aims to depend on virtual Benchmarking style in the eval

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Mon Dec 25 2017
Journal Name
Al-khwarizmi Engineering Journal
A new Cumulative Damage Model for Fatigue Life Prediction under Shot Peening Treatment
...Show More Authors

 Abstract

In this paper, fatigue damage accumulation were studied using many methods i.e.Corton-Dalon (CD),Corton-Dalon-Marsh(CDM), new non-linear model and experimental method. The prediction of fatigue lifetimes based on the two classical methods, Corton-Dalon (CD)andCorton-Dalon-Marsh (CDM), are uneconomic and non-conservative respectively. However satisfactory predictions were obtained by applying the proposed non-linear model (present model) for medium carbon steel compared with experimental work. Many shortcomings of the two classical methods are related to their inability to take into account the surface treatment effect as shot peening. It is clear that the new model shows that a much better and cons

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Sensors
A Modern Approach towards an Industry 4.0 Model: From Driving Technologies to Management
...Show More Authors

Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph

... Show More
View Publication
Scopus (123)
Crossref (105)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref