Since the beginning of the twentieth century, the art of composition has witnessed major transformations that accompanied the transformations that occurred in the cognitive field. The plastic artists rejected the prevailing artistic line, and sought to create a new artistic format that accommodates the new social and cultural problems. So was the announcement of the era of modernity in the late nineteenth century, with the birth of the impressionism movement that gave a place to challenge all that is familiar. . And he drew the attention of the researcher, and for that he chose the research title (Characteristics of Modernity in the Works of Saleh Al-Jumayyi (Analytical Study)) The researcher divided the research as follows:
Methodological framework: It includes the research problem, its importance and objectives, as well as the limits of the research and the definition of terminology.
The theoretical framework and previous studies: It was divided into two topics that came as follows: The first topic: modernity is concept and meaning, the second topic: stylistic techniques in Saleh al-Jumai’s works: After that, the researcher reached the indications of the theoretical framework.
Research procedures: it includes the research method, the research community, the research tools, the validity of the tool, the research sample, and the analysis of samples according to the indicators that the researcher came out with from the theoretical framework. After analyzing the samples, the researcher reached a number of results and conclusions:
1. One of the characteristics of the period of modernity is that the artist has become carrying a style of uniqueness, renewal and freedom in the individual stylistic performance stemming from the self, and rejecting all the prevailing values in the light of the consumer society governed by the machine and the heritage, moving away from the burdens and impediments of reality, replacing them with peaceful formations, as in the samples (1, 2,3).
2. Modernity is the intellectual structure that emerged from the modernization experiences that European culture entered into, which made the artist leave the concept of eternal values and idealism in the shadow of sacred texts when the teachings of the Church dominated the culture in general.
Then the researcher wrote down the recommendations and proposals, and concluded the research, the sources and references
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreIn our time, not too long ago, the universities of the world have been fast to take care of the study of an innovative type of technical and human studies, called the science of "comparative literature". Comparative research studies have grown and flourished rapidly in response to the demands of both mental and artistic life. This shows the increasing awareness at both the modern national and the international levels in order to develop through connecting with the international intellectual, nental and artistic currents to nurture ethics and originality. Comparative studies show that the beginning of the comparative literature goes back to the time when the Latin literature was connected to the Greek literature and th
... Show Moreكتاب أسس رياضة القوس والسهم أ.د. فاطمة عبد مالح م.د. أفراح عبد القادر تاريخ رياضة القوس والسهم يحتوى هذا الكتاب على اسس وطبيعة رياضة القوس والسهم :من تجهيزات ومهارات وطريقة اللعب وقانون اللعبة و حساب النتائج اضافة الى الامور التدريبية التي ترتقي بقدرات لاعب القوس والسهم وهو مساعد لطلبة الدراسات
كتاب أساسيات تدريب رياضة المبارزة تأليف الدكتورة / فاطمة عبد مالح الدكتور/ ظافر ناموس الطائى رياضة المبارزة من الرياضات القديمة التي يعتز بها الفرد الذي زاولها منذ القدم لأنها رمز النبل والأخلاق والقوة والشموخ والرفعة إضافة لكونها إحدى الألعاب الأولمبية القديمة التي تتلقى الدعم والرعاية مع سائر
Terrorism is a serious problem for many societies today. This research aims to identify the impact of terrorism and displacement crisis on human security, which was a shock to the Iraqi society in terms of its impact on the psychological, social and economic conditions of the individual, family, and society. The variety of methods of carrying out the terrorist operations that resulted from the phenomenon of human displacement witnessed by Iraq since the middle of 2014. This phenomenon has its demographic, political and social dimensions.
In order to achieve the goal of this study and the importance of the subject, the social survey method was used by selecting a sample of 200 IDPs in a compou
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreThe aim of the present work, was measuring of uranium concentrations in 25 soil samples from five locations of Al-Kut city. The samples taken from different depths ranged from soil surface to 60cm step 15 cm, for this measurement of uranium concentrations .The most widely used technique SSNTDs was chosen to be the measurement technique. Results showed that the higher concentrations were in Hai Al- Kafaat which recorded 1.49 ± 0.054 ppm . The uranium content in soil samples were less than permissible limit of UNSCEAR(11.7ppm).