Preferred Language
Articles
/
jcofarts-794
Features of Modernity in the Works of Saleh Al-Jami (An Analytical Study): رؤى قحطان عبد الله
...Show More Authors

Since the beginning of the twentieth century, the art of composition has witnessed major transformations that accompanied the transformations that occurred in the cognitive field. The plastic artists rejected the prevailing artistic line, and sought to create a new artistic format that accommodates the new social and cultural problems. So was the announcement of the era of modernity in the late nineteenth century, with the birth of the impressionism movement that gave a place to challenge all that is familiar. . And he drew the attention of the researcher, and for that he chose the research title (Characteristics of Modernity in the Works of Saleh Al-Jumayyi (Analytical Study)) The researcher divided the research as follows:
Methodological framework: It includes the research problem, its importance and objectives, as well as the limits of the research and the definition of terminology.
The theoretical framework and previous studies: It was divided into two topics that came as follows: The first topic: modernity is concept and meaning, the second topic: stylistic techniques in Saleh al-Jumai’s works: After that, the researcher reached the indications of the theoretical framework.
Research procedures: it includes the research method, the research community, the research tools, the validity of the tool, the research sample, and the analysis of samples according to the indicators that the researcher came out with from the theoretical framework. After analyzing the samples, the researcher reached a number of results and conclusions:
1. One of the characteristics of the period of modernity is that the artist has become carrying a style of uniqueness, renewal and freedom in the individual stylistic performance stemming from the self, and rejecting all the prevailing values in the light of the consumer society governed by the machine and the heritage, moving away from the burdens and impediments of reality, replacing them with peaceful formations, as in the samples (1, 2,3).
2. Modernity is the intellectual structure that emerged from the modernization experiences that European culture entered into, which made the artist leave the concept of eternal values and idealism in the shadow of sacred texts when the teachings of the Church dominated the culture in general.
Then the researcher wrote down the recommendations and proposals, and concluded the research, the sources and references

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 02 2021
Journal Name
New Trends In Information And Communications Technology Applications: 4th International Conference, Ntict 2020, Baghdad, Iraq, June 15, 2020, Proceedings 4
Iris recognition using localized Zernike features with partial iris pattern
...Show More Authors

Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Dorsal hand veins features extraction and recognition by correlation coefficient
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Wed Dec 11 2019
Journal Name
Journal Of The College Of Education For Women
A Comparative Study in the (myth of Pygmalion) between Bernard Shaw and Sadik Hidayat: University of Ferdowsi - Iran
...Show More Authors

  In our time, not too long ago, the universities of the world have been fast to take care of the study of an innovative type of technical and human studies, called the science of "comparative literature". Comparative research studies have grown and flourished rapidly in response to the demands of both mental and artistic life. This shows the increasing awareness at both the modern national and the international levels in order to develop through connecting with the international intellectual, nental and artistic currents to nurture ethics and originality. Comparative studies show that the beginning of the comparative literature goes back to the time when the Latin literature was connected to the Greek literature and th

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 16 2023
Journal Name
المكتبة الرياضية الشاملة
كتاب أسس رياضة القوس والسهم - فاطمة عبد مالح » المكتبة الرياضية الشاملة
...Show More Authors

كتاب أسس رياضة القوس والسهم أ.د. فاطمة عبد مالح م.د. أفراح عبد القادر تاريخ رياضة القوس والسهم يحتوى هذا الكتاب على اسس وطبيعة رياضة القوس والسهم :من تجهيزات ومهارات وطريقة اللعب وقانون اللعبة و حساب النتائج اضافة الى الامور التدريبية التي ترتقي بقدرات لاعب القوس والسهم وهو مساعد لطلبة الدراسات

View Publication
Publication Date
Mon Apr 20 2020
Journal Name
المكتبة الرياضية الشاملة
كتاب أساسيات تدريب رياضة المبارزة - فاطمة عبد مالح » المكتبة الرياضية الشاملة
...Show More Authors

كتاب أساسيات تدريب رياضة المبارزة تأليف الدكتورة / فاطمة عبد مالح الدكتور/ ظافر ناموس الطائى رياضة المبارزة من الرياضات القديمة التي يعتز بها الفرد الذي زاولها منذ القدم لأنها رمز النبل والأخلاق والقوة والشموخ والرفعة إضافة لكونها إحدى الألعاب الأولمبية القديمة التي تتلقى الدعم والرعاية مع سائر

View Publication
Publication Date
Wed Dec 11 2019
Journal Name
Journal Of The College Of Education For Women
Terrorism and Internal Displacement in Iraq: A Field Study in Baghdad
...Show More Authors

    Terrorism is a serious problem for many societies today. This research aims to identify the impact of terrorism and displacement crisis on human security, which was a shock to the Iraqi society in terms of its impact on the psychological, social and economic conditions of the individual, family, and society. The variety of methods of carrying out the terrorist operations that resulted from the phenomenon of human displacement witnessed by Iraq since the middle of 2014. This phenomenon has its demographic, political and social dimensions.

    In order to achieve the goal of this study and the importance of the subject, the social survey method was used by selecting a sample of 200 IDPs in a compou

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Estimation the Radioactive Pollution by Uranium in the Soil of Al-Kut City/ Iraq
...Show More Authors

The aim of the present work, was measuring of uranium concentrations in 25 soil samples from five locations of Al-Kut city. The samples taken from different depths ranged from soil surface to 60cm step 15 cm, for this measurement of uranium concentrations .The most widely used technique SSNTDs was chosen to be the measurement technique. Results showed that the higher concentrations were in Hai Al- Kafaat which recorded 1.49 ± 0.054 ppm . The uranium content in soil samples were less than permissible limit of UNSCEAR(11.7ppm).

View Publication Preview PDF
Crossref (1)
Crossref