The research tagged (the image of the soldier in contemporary Iraqi painting) dealt with the concept of the image as one of the basic concepts in the creative achievement, whether it is in the field of art, literature or beauty. Therefore, the concept of the image expanded to express the various aspects of human creativity, including the field of painting. To know the image of the soldier in contemporary Iraqi painting, the research included four chapters. The first chapter focused on the methodological framework of the research, while the second chapter included three sections. The first topic dealt with the philosophical and artistic concept of the image. The second topic was concerned with the representations of the soldier's image in modern painting, while the third topic dealt with the characteristics of the soldier's image in Iraqi painting.
The third chapter was devoted to research procedures. In order to achieve the goal of the research, a number of results were reached in the fourth chapter, including:
1- The imaginary image of the soldier appeared through a visual scene that combined different times and places in one space, as Alaa Bashir relied on the combination of the two aerial perspectives (or the so-called bird’s eye), and the ground according to metaphysical philosophy, which aims to transform the world and things into imaginary visions. Where the idea transcends the reality. (model 1)
2- The realistic sensory image of the soldier was shown by the colors and their poetic effects on the influences and suggestive codes carried by the color, and the depth of the spirit of originality mixed with heritage, which makes us feel belonging, authenticity and national identity, defined by the priorities of the sensible and what is aesthetically perceived. (Model 2)
1- The figurative image is one of the images that arise in the art of painting, and it witnesses an intense presence in the context of the significance of the image and the referral to a mental conception through concepts abstracted from its sensory image.
2- The imaginary image in art witnesses a moral dimension regarding the mind’s retrieval of things abroad, and building them in a way that reveals new relationships that were not realized before.
3- According to mental images, images are manifested in art within the limits of the work of knowledge and mental awareness. Images are formed when the mind is the repository, as the analyzer and compound of the meanings of things outside.
4- The sensory image in art works on dismantling reality by relying on simulation, as imagination works in it to depict the moral abstract in a sensual way, relying on experience as a source of all knowledge and its domain is the mind
A series of new 4-(((4-(5-(Aryl)-1,3,4-oxadiazol-2-yl)benzyl)oxy)methyl)-2,6-dimethoxy phenol (6a-i) were synthesized from cyclization of 4-(((4-hydroxy-3,5-dimethoxy benzyl)oxy)methyl)benzohydrazide with substituted carboxylic acid in the presences of phosphorusoxy chloride.The resulting compounds were characterized by IR, 1H-NMR, 13C-NMR, and HRMS data. 2,2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) assays were used to screen their antioxidant properties. Compounds 6i and 6h exhibited significant antioxidant ability in both assay. Furthermore, type of substituent and their position of the aryl attached 1,3,4-oxadiazole ring at position five are play an important roles in enhancing or declining the antio
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreSynthesis and preliminary biological evaluation of imidazo (2, 1-b) Thiazole derivatives is reported. Under Mannich conditions, a series of new imidazo (2, 1-b) Thiazole derivatives were synthesized. Starting from the reaction of 2- amino thiazole with 4- bromo phenyl bromide to produce 5-(4-bromo phenyl) imidazo (2, 1-b) thiazoles, following by introduce the substituted aminomethyl at position 6-by reacting with different aromatic amines under Mannich conditions to afford 6-secondary amine-5-(4-bromo phenyl) imidazo (2,1-b) thiazole in high yields.
FT-IR, 1H NMR, and 13C NMR techniques were used to characterize the synthesized derivatives. In addition, all compounds were tested for their antioxidant activity, and thr
... Show MoreThis work discusses the beginning of fractional calculus and how the Sumudu and Elzaki transforms are applied to fractional derivatives. This approach combines a double Sumudu-Elzaki transform strategy to discover analytic solutions to space-time fractional partial differential equations in Mittag-Leffler functions subject to initial and boundary conditions. Where this method gets closer and closer to the correct answer, and the technique's efficacy is demonstrated using numerical examples performed with Matlab R2015a.
The theories and applications of speaker identification, recognition, and verification are among the well-established fields. Many publications and advances in the relevant products are still emerging. In this paper, research-related publications of the past 25 years (from 1996 to 2020) were studied and analysed. Our main focus was on speaker identification, speaker recognition, and speaker verification. The study was carried out using the Science Direct databases. Several references, such as review articles, research articles, encyclopaedia, book chapters, conference abstracts, and others, were categorized and investigated. Summary of these kinds of literature is presented in this paper, together with statistical analyses
... Show MoreThis study included partial purification of the lipase enzyme from the karnel of the pecan nut. After applying ion exchange chromatography technique using CM-Cellulose, two lipase isoenzymes were observed with specific activity values of 2.66 and 1.7 units/mg protein. The highest activity of both isoenzymes appeared at the optimum pH values of 8 and 6 and at temperatures of 40 and 50 °C, respectively. A pure single band was obtained by using electrophoresis technique and it was found that the approximate molecular weight was 42 kDa for the two isoenzymes. The study dealt with the preparation of the diester compound 1,4-diacetoxybenzene, which was diagnosed by GC-MS and 1H NMR spectrometry. When studying the inhibitio
... Show MoreA series of 4-(methylsulfonyl)aniline derivatives were synthesized in order to obtain new compounds as a potential anti-inflammatory agents with expected selectivity against COX-2 enzyme. In vivo acute anti-inflammatory activity of the final compounds 11–14 was evaluated in rat using an egg-white induced edema model of inflammation in a dose equivalent to 3 mg/Kg of diclofenac sodium. All tested compounds produced significant reduction of paw edema with respect to the effect of propylene glycol 50% v/v (control group). Moreover, the activity of compounds 11 and 14 was significantly higher than that of diclofenac sodium (at 3 mg/Kg) in the 120–300 minute time interval, while compound 12 expressed a comparable effect to that of di
... Show More