The research current ( features tendency cosmic in contemporary Iraqi configuration) attempt to study the dimensions of the conceptual and philosophical foundations upon which the tendency of cosmic within the period that extended its influence beyond the place where I grew up to be circulated concepts in all parts of the world, it is no doubt that the world is now heading to rapprochement after the tremendous developments in the field of communication technology and reflected heavily on identity concepts, privacy, the concept of nation-states ... etc. to become an individual and a large area of access to other cultures, and all that aroused the interest of contemporary Iraqi artist this interest arising from the desire to keep up with developments in the world of developments at the level of ideas or at the level of their practical applications in the field of art. So promising researchers studied four chapters, the first chapter of it concerned with the methodological framework for the search represented research problem which is determined by answering the following two questions: - What are the features of the universal tendency that emerged in the products of contemporary art!? - Is it possible to identify those features and levels of formal and technical Alamadaminah artists Fine Iraqis across Mndzhm Fine!? The first chapter also included a goal Find a (detection features tendency cosmic in contemporary Iraqi art) The boundaries of research has been limited to the study of the features of the tendency of cosmic and analysis of pictorial models for artwork Iraqi contemporary in the time period (1990-2010) performed by artists Iraqis inside and outside Iraq The materials are different, then Chapter mentioned terminology entitled Find seal, either disconnect the second has included a presentation of the theoretical framework, which included three sections, the first of it (the concept of cosmic and privacy) and taking second section (features tendency cosmic in contemporary global Fine Arts), and display the third section (Find approaches between the contemporary global art and contemporary Iraqi Art) and ended Chapter indicators theoretical framework. Chapter III has specialized display research procedures in terms of monitoring the research community and information related to the selection of a sample of it deliberate manner, which amounted to (35) in accordance with Cecchelaa and by (4) models of the sample covered the limits Find the adoption of the descriptive approach and the way the descriptive analysis for the purpose of analysis. Chapter IV brought together the results of research and conclusions as well as recommendations and proposals, followed by the list of sources
Corruption (Definition , Characteristics , Reasons , Features , and ways of combating it)
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreIn this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.
Methods: 112 placentae samples were investigated during the period from August 2007 to August 2008 under light microscopefor mother aged 15 - 45 years old.Results: It was found that normal placental shapes had no correlation to mother age, while abnormal shapes were found more inyoung age groups. The better placental measured parameters were found in mother age 20-24 years. The percentages ofabnormal umbilical cord insertion were very high compared to other studies. Babies’ gender had a correlation with theplacental thickness; male babies have thicker placentae than females. Male babies have longer umbilical cords with widerdiameter than females. Light microscope picture showed the chorionic villi with isolated fetal blood vessel were hig
... Show MoreThe article discusses political discourse as a communicative space of modern politics in the context of the anthropocentric paradigm. The following components of the political discourse have been outlined: the character of the subject and that of the addressee, genres of oral and written speech, the opposition of monologue and dialogue, the functions, the amount of information among the genres, the aim of speech.
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More