The Iraqi and Iranian pottery has a significant role in the contemporary world pottery space, despite the fact that influences created those formulation, thus the researcher supposes that there is a relation between the potter and his environment within Iraq's environment and Iran's environment, which are similar at times and different at other times. The researcher, hence, found himself in front of a number of questions:
1- How much was the Iraqi potter inspired by the environment compared to the Iranian potter?
2- Has the Iraqi and Iranian pottery been really inspired by the environment items or there were modified metaphors?
The current research aims at (identifying the influential environmental characteristics in the Iraqi and Iranian contemporary pottery).
The research community consists of two groups of artistic works that are subject to the study. The first is the Iraqi research community which consists of contemporary pottery works of the artist Saad Shakir, as a model, and the second is the Iranian research community which consists of the pottery works of the Iranian artists Muhammed Madhi Anooshqar as a model. The researcher analyzed two samples of the works of the potters and came up with important results including:
1- The Iraqi contemporary artist, by means of investigation and experimentation, was able to establish artistic and aesthetic data, by drawing inspiration from the cultural heritage with a contemporary spirit and style as in the model (1).
2-the richness of the cultural heritage was evident in the Iraqi artistic achievement due to the seniority of the Iraqi civilization, with a shortcoming in the Iranian side as shown in model (1).
This research seeks to explore the impact of notifications on enhancing user engagement with websites, primarily through user subscriptions and their interaction with notifications on these websites. The significance of this study lies in its implications for crafting compelling headlines that capture users' attention, streamline their access to journalistic content, and align with the objectives and editorial policies of news websites. It sheds light on the factors influencing users' preferences for specific notifications and their engagement with content based on their individual interests, motivations, and the satisfaction derived from such interactions.
The researcher has reached several key findings, inc
Background: since December 2019, China and in particularly Wuhan, faced an unprecedented an outbreak challenge of coronavirus disease 2019, caused by the severe acute respiratory syndrome coronavirus 2. Clinical characteristics of Iraqi patients with COVID-19 and risk factors for mortality needed to be shared with the health care providers to improve the overall disease experience. Methods: prospective, single-center study recruited patients with confirmed SARS-CoV-2 infection who were admitted to Al-Shifaa Isolation Center / Baghdad Medical City between the mid of March and the end of April 2020 until had been discharged or had died. Demographic data, information on clinical signs, symptoms, at presentation, treatment, have been collected
... Show MoreRecord, verify, and showcase your peer review contributions in a format you can include in job and funding applications (without breaking reviewer anonymity).
Profit is a goal sought by all banks because it brings them income and guarantees them survival and continuity, and on the other hand, facing commitments without financial crisis. Hence the idea of research in his quest to build scientific tools and means that can help bank management in particular, investors, lenders and others to predict financial failure and to detect early financial failures. The research has produced a number of conclusions, the most important of which is that all Islamic banks sample a safe case of financial failure under the Altman model, while according to the Springate model all Islamic banks sample a search for a financial failure except the Islamic Bank of Noor Iraq for Investment and Finance )BINI(. A
... Show MoreThis study aims to show some of Imam Al-Bukhari's criticism of the Hadith from the Metn side, and part of his methodology in dealing with the correct hadiths that are tainted by a bug. This research focuses on what Imam Al-Bukhari summarized in his Sahih illusion of the narrator in his attribution, or uniqueness of the narrator, or to suggest a novel. We find that Bukhari sometimes abbreviates the hadeeth, and does not bring it out completely in his Sahih. He is satisfied with the abbreviated position but has done so because of a bug in it. The Bukhari usually does not declare his intention but knows this through tracking, inspection, and research of the correct hadiths.
Abstract
The study discussed three areas in strategic thinking, namely, (patterns elements, outcomes) , this study aimed to measure extent to which strategic leaders have the type or types of patterns of strategic thinking, and measure the extent of their use of the elements of strategic thinking, and measurement of strategic thinking outcomes for managers at various levels , And to know the relationship between the modes of strategic thinking, elements and outcomes in organizations. the study included five banks and four hospitals and four colleges and universities, has been a research sample consisted of 168 individuals, distributed in positions (Director General , Director of Directorate , Director of
... Show MoreSimulation Study
Abstract :
Robust statistics Known as, Resistance to mistakes resulting of the deviation of Check hypotheses of statistical properties ( Adjacent Unbiased , The Efficiency of data taken from a wide range of probability distributions follow a normal distribution or a mixture of other distributions with different standard deviations.
power spectrum function lead to, President role in the analysis of Stationary random processes, organized according to time, may be discrete random variables or continuous. Measuring its total capacity as frequency function.
Estimation methods Share with
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreThe study aims at investigating the quality of internal auditing and its impact on nature, timing, and procedures of external audit, based on international auditing standards, in particular ISA (610). The standard ISA (610) requires the external auditors to assess independence, the scope of internal audit unit, competence, and due professional care of internal auditors as indicators that reflect the quality of internal audit performance before deciding to rely on internal auditors.
The sample of this study consisted of external auditors in Iraqi Solidary Companies for Auditing. A questionnaire was distributed to them via e-mail
... Show MoreThis work is concerned with designing two types of controllers, a PID and a Fuzzy PID, to be used
for flying and stabilizing a quadcopter. The designed controllers have been tuned, tested, and
compared using two performance indices which are the Integral Square Error (ISE) and the Integral
Absolute Error (IAE), and also some response characteristics like the rise time, overshoot, settling
time, and the steady state error. To try and test the controllers, a quadcopter mathematical model has
been developed. The model concentrated on the rotational dynamics of the quadcopter, i.e. the roll,
pitch, and yaw variables. The work has been simulated with “MATLAB”. To make testing the
simulated model and the controllers m