Preferred Language
Articles
/
jcofarts-1226
The new aesthetic in contemporary world painting
...Show More Authors

The research tagged: the new aesthetic in contemporary world painting. The research contained five chapters. The first chapter dealt with the research problem and its importance. It dealt with the concept of the new aesthetic as a concept concerned with the topics of the mind, i.e. the most comprehensive and diverse topics. The New Aesthetic is an aesthetic and stylistic structure whose taste, aesthetic, artistic and emotional contribute to its structure with awareness of the context. The aim of the research is to identify the new aesthetic in contemporary world painting. As for the objective limits of the research, the researcher was interested in studying the new aesthetic, especially in abstract expressionism, pop art, opera, and conceptual art, for the period (1948-1997) in America. The chapter also included keywords. The second chapter dealt with the concept of beauty and aesthetics. The third chapter dealt with aesthetics and awareness of the cultural and social context in modern painting. The fourth chapter dealt with the new aesthetic and its applications in contemporary formation. In the fifth chapter, the researcher reached a set of results, including:
1-The new aesthetic found in expressionism a space that was able to reproduce the above, in a psychological space, after which the artist turned to search for his own personal visions and ideas, just as surrealism was the influential reference with its ancient symbols and myths, which gave the artists of abstract expressionism an opportunity to express meanings latent by the most obvious means.
2- Visual data, including multimedia in pop art, formed new aesthetic approaches, and it is part of the exchange of ideas and its philosophy in time.
Then, the researcher reached a set of conclusions, and then a list of sources, references, and a summary of the research in English.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Synthesis of New N-Substituted Phenoxazine Derivatives
...Show More Authors

This work comprises the synthesis of new phenoxazine derivatives containing N-substituted phenoxazine starting from phenoxazine (1). Synthesis of ethyl acetate phenoxazine (2) through the reaction of phenoxazine with ethylchloroacetate, which reacted with hydrazine hydrate to give 10-aceto hydrazide phenoxazine (3), then reacted with formic acid to give 10-[N-formyl acetohydrazide] phenoxazine (4). Reaction of compound (4) with phosphorous pentaoxide or phosphorus pentasulphide to gave 10-[N-methylene-1,3,4-oxadiazole] phenoxazine (5) and 10-[N-methylene-1,3,4-thiadiazole] phenoxazine (6).

View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Pharmacie Globale
Synthesis and microbiological study of new sulfonamides
...Show More Authors

In contrast to the classical antibacterial sulfa drugs that are unsubstituted or monosubstituted, our newly synthesized analogs were designed to obtain sulfonamide moiety containing disubstituted hetero nitrogen atom. These compounds were formed successfully by chlorosulfonation of acetanilide and the product was treated with different cyclic amines and finally amide hydrolysis was necessary to get agents that were analyzed for IR, UV, CHN, melting points and solubility. At last, we studied their antibacterial activity on certain types of bacteria and we noticed the inactivity due to possible steric factor. Principly, this means these products have no inhibiting action against the used microbes.

Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Pharmaceutical Sciences & Research
New Derivatives of Thiozolidinone, Synthesis and Characterization
...Show More Authors

The present work involved synthesis of new thiozolidinone derivatives,These derivatives could be divided into three type of compounds; quinolin-2-one[V]a,b ,Schiff bases[VI]a,b and imide compounds[VII]a-d. The reaction p-Hydroxyacetophenone with thiosemicarbazide led to formation thiosemicarbazon compound [II], the reacted of thiosemicarbazone with chloro acetic acid in CH3CO2Na led to yield 4- thiazelidinone compound[III] in addition, thiosemicarbazide was POCl3 to [III] give [IV] compound used intermediates to synthesis new compounds of reacted with two type of coumarin in glacial acetic acid to give quinolin-2-one[V]a,b, The later compound refluxing with different benzaldehyde in dry benzene and glacial acetic acid give Schiff bases[VI]a

... Show More
Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Bulletin Of Mathematics And Statistics Research
New Approximation Operators Using Mixed Degree Systems
...Show More Authors

This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Drug Delivery Technology
Phytochemical screening and isolation of new compounds
...Show More Authors

Scopus (7)
Scopus
Publication Date
Fri Jan 01 2016
Journal Name
Modern Applied Science
New Combined Technique for Fingerprint Image Enhancement
...Show More Authors

This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one

... Show More
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Wed Jul 17 2019
Journal Name
Advances In Intelligent Systems And Computing
A New Arabic Dataset for Emotion Recognition
...Show More Authors

In this study, we have created a new Arabic dataset annotated according to Ekman’s basic emotions (Anger, Disgust, Fear, Happiness, Sadness and Surprise). This dataset is composed from Facebook posts written in the Iraqi dialect. We evaluated the quality of this dataset using four external judges which resulted in an average inter-annotation agreement of 0.751. Then we explored six different supervised machine learning methods to test the new dataset. We used Weka standard classifiers ZeroR, J48, Naïve Bayes, Multinomial Naïve Bayes for Text, and SMO. We also used a further compression-based classifier called PPM not included in Weka. Our study reveals that the PPM classifier significantly outperforms other classifiers such as SVM and N

... Show More
View Publication
Scopus (21)
Crossref (10)
Scopus Crossref
Publication Date
Thu Oct 25 2018
Journal Name
Journal Of Planner And Development
تجزئة قطع الارض السكنية وتاثيرها على خدمات البنى التحتية – الماء والصرف الصحي "حالة دراسية مدينة بغداد- بغداد الجديدة – المحلة 731"
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref