This research provides a study of the virtual museums features and characteristics and contributes to the recognition of the diversity of visual presentation methods, as the virtual museums give the act of participation and visual communication with programs at an open time, so that it would contribute to reflection, thinking and recording notes, developing the actual and innovative skills through seeing the environments. The study has been divided into two sections the first one is virtual museum techniques. The techniques were studied to reach the public and are used remotely by the services of personal computers or smart phones being virtual libraries that store images and information that was formed and built in a digital way and how the aesthetics of the virtual museum had a profound effect on reception. The second section was the aesthetics of the imaginary space in the virtual museum to study the analysis of the samples, the diversity of presentation methods in virtual museum space. The research ended up with the results and conclusions. The importance of virtual museums which invest that space in the presentation is that they present information in a simple and interesting way in receiving the experiences and the viewer has the freedom to choose the distance in which he sees the work and the ease of touching the different dimensions of objects through the sense of sight. The virtual museums are areas located within the Internet whose purpose is advertising and defining a museum which could have no presence in reality. The use of virtual museums technologies, and accelerated technical progress and developments in the field of communication and technology and the growing interest in knowledge and discovery increased. The research ended up with some recommendations and proposals.
Naber and toning in the modern Arab poetry Mahmoud Darwish, a model
This research deals with the study of types of parallelism in contemporary Arabic poetry and took the hair Mahmoud Darwish, a model for the study has been the goal of research to clarify the term parallelism and the statement of the most important types, said evidence of that in the poetry of Mahmoud Darwish
This tagged research deals with the manifestations of femininity in Mahmoud Fahmy's drawings by studying and monitoring the presence and how women were represented in the drawings of the artist Mahmoud Fahmy. Through the drawings of the expatriate Iraqi artist, Mahmoud Fahmy, in highlighting the manifestations of beauty for women, which constitute a formal characteristic that appears through the body, and Fahmy depicts it in an atmosphere of realism at times and magical realism at other times, as the research consists of four chapters. Through the following question: Did femininity appear in the drawings of the artist Mahmoud Fahmy? The importance of the research is that it sheds light on the manifestations of femininity in the drawings
... Show MoreBased on the theoretical review of researches and studies concerned with virtual teams in organizations, it was found that the role of virtual teams varies from case to another, and it may be positive or opposite. The purpose of the current research is to examine the role of virtual teams in the impact of cultural intelligence on the strategic excellence of Zain worldwide Group. An electronic questionnaire was designed through the (Google) and (Microsoft) forms, and distributed then on a sample of (146) participants with a high organizational level of the HRM departments within the group. The results showed that there was a positive moderator role of virtual teams in the relationship of cultural intelligence and strategic excellence
... Show MoreBackground: The Covid-19 pandemic changed the world; its most important achievement for education was changing the approach from traditional to virtual education. The present study aimed to investigate the role of virtual education networks on mental health of students including personality, beliefs, scientific, and cultural dimensions, in selected countries.Methods: This was an exploratory and applied study. According to the phenomenology strategy, theoretical saturation occurred after 24 semi-structured and targeted qualitative interviews with teachers from Iran, Iraq, Syria and Lebanon, in 2023. Quantitative data was collected through a researcher-made online questionnaire with 423 participants. Teachers with at least a Bachelor’s degr
... Show MoreThe approach of greening existing buildings, is an urgent necessity, because the greening operation provides the speed and optimal efficiency in the environmental performance, as well as keeping up with the global green architecture revolution. Therefore, greening existing buildings in Iraq is important for trends towards renewable energies, because of what the country went through economic conditions and crises and wars which kept the country away from what took place globally in this issue. The research problem is: insufficient knowledge about the importance and the mechanism of the greening of existing buildings, including its environmental and economic dimensions, by rationalization of energy consumption and preservi
... Show MoreThe distribution of the intensity of the comet Ison C/2013 is studied by taking its histogram. This distribution reveals four distinct regions that related to the background, tail, coma and nucleus. One dimensional temperature distribution fitting is achieved by using two mathematical equations that related to the coordinate of the center of the comet. The quiver plot of the gradient of the comet shows very clearly that arrows headed towards the maximum intensity of the comet.
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More