Preferred Language
Articles
/
jcofarts-1137
metaphor and their transformations in surrealist painting
...Show More Authors

The problem of research tagged: (metaphor and its transformations in the surreal drawing) dealt with the nature of the concept of metaphor and the mechanisms of its work in the contemporary global achievement. The research came in four chapters: The first chapter was concerned with the systematic framework for the research represented by the problem of the research, as it was manifested through this study by metaphor and its transformations, which were associated with the Surreal drawing papers in Europe. The goal of the study has been crystallized with the following:

Exposing metaphor and its transformations in the visual system of the surreal drawing.
As for the limits of the research, I was interested in analyzing video models, for the surreal drawing for the period from (1922-1938)
As for the second chapter, which is the theoretical framework, it contained three investigations that dealt with the first topic: metaphor: the concept and meaning in the visual field.
As for the second topic: it dealt with the transformations of showing techniques in formation, and the third topic: I meant the study of the transformation in art between concepts and facts.
As for the third chapter, it is concerned with research procedures represented by the metaphor applications in the surreal drawing, then after that it included the identification of the research community and its adult eye (4) models, then the research tool and the analysis of the sample.
As for the fourth chapter, it included the results of the research, conclusions, recommendations and proposals. The researcher has reached a number of results in response to the goals of the research, including:
1- The concept of technology in the surreal drawing has been a metaphor for the immediate moments that break the perception, in light of the references and displacements that are emanating on imagination.
2- The optical surface is influenced by activating the movement of the calligraphy, and by means of the indicative action, in a way that achieves a visual displacement regarding the mock metaphor, which makes it lose its objective prayers.
3- The removal of visual systems from its objective circle by activating forms and in an automatic dynamic way, embodies the semantic discourse, which often gives its ambiguity an intense poetic dialogue, which enhances the role of the legendary reference.
The researcher reached a set of conclusions and then the list of sources and references.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Early Baldness in Males and Hormonal Changes
...Show More Authors

Androgenetic alopecia (AGA) or baldness is a common form of hair loss, affecting men more than women .The exact causes and pathogenesis of baldness are not well understood. A search for new drug is still needed. This study aims to evaluate the role of gonadotropins hormones in hair loss in males and its possibility to be used as treatment target. A total of 78 volunteers 43 with baldness and 35 healthy men were participated in this study. Their age ranged between (20-49) years, the studied groups were divided into two categories: firstly according to age (group1: 20-29 year), (group2: 30-39 year),and (group3: 40-49 year).Secondly according to baldness degree. LH and FSH were measured by using Enzyme Linked Immunosorbent Assay (ELISA) kits.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 30 2011
Journal Name
Al-kindy College Medical Journal
Asymptomatic Bacteriuria in Pregnant and Diabetic Women
...Show More Authors

Background: Asymptomatic bacteriuria (ASB) is
defined as isolation of a specified quantitative count
of bacteria in an appropriately collected urine
specimen from an individual without symptoms or
signs of urinary tract infection.
Aim of study: To evaluate the frequency of
bacteriuria according to age, pregnancy, and type II
diabetes mellitus in a sample of Iraqi women.
Patients and Methods: A total of 125 female
individuals were involved. The study participants
were classified into the following groups: nonpregnant
women with type II diabetes mellitus,
pregnant women with type II diabetes mellitus,
pregnant women without type II diabetes mellitus, and
apparently healthy non-pregnant women. Urine

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
Knowledge And Awareness Towards Cryptosporidiosis In Baghdad
Knowledge and awareness towards Cryptosporidiosis in Baghdad
...Show More Authors

Knowledge and awareness towards cryptosporidiosis were assessed in this study during the period from April 2009 till June 2011, among 188 person of both gender which were divided in different groups and sub groups as following Group 1: include 48 physician from different hospitals and primary health care centers in Baghdad this group were sub divided into 30 Specialist doctors and 18 General practitioners doctors. Group 2 : include 45 teaching staff member from Biology department , Biotechnology department in University of Baghdad and AL-Nahrain University as well as teaching staff member from the college of medicine – University of Baghdad and University of Mustansiryah, this group were sub divided into 9 Ph.D and 36 M.Sc. + B.Sc. me

... Show More
Publication Date
Mon Feb 01 2016
Journal Name
2016 International Conference On Computing, Networking And Communications (icnc)
Connectivity and rendezvous in distributed DSA networks
...Show More Authors

In this paper, we use concepts and results from percolation theory to investigate and characterize the effects of multi-channels on the connectivity of Dynamic Spectrum Access networks. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from-a phenomenon which we define as channel abundance. To cope with the existence of multi-channels, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocol, it becomes difficult for two nodes to agree on a common channel, thereby potentially remaining invisible to each other. We model this

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Apr 02 2021
Journal Name
Review Of International Geographical Education
Energy Security and Energy Transition in Germany
...Show More Authors

Energy is one of the components of the national security of countries and is of particular importance to the industrialized countries, including Germany. Energy policy includes many areas and has an impact on various sectors such as the environment, climate, agriculture and others. During the past few years, Germany has witnessed many transformations, the most important of which is the energy transition towards renewable energy, and it was strengthened in the strategy that was It was developed in 2010, which aims to achieve a long-term energy transformation, and sales of the German energy technology sector have evolved from 2010 to 2020, and this issue is related on the other hand to the concept of energy security and because of its strateg

... Show More
Publication Date
Sat Oct 17 2015
Journal Name
Monthly Notices Of The Royal Astronomical Society
Line and continuum variability in active galaxies
...Show More Authors

View Publication
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Feb 10 2026
Journal Name
Al-academy
Hijab and Burqa in Islamic Fashion System
...Show More Authors

View Publication
Publication Date
Mon Feb 19 2018
Journal Name
Al-academy
Domination and motivation in Mona Saudi sculptures
...Show More Authors

This research is the subject of "Domination and Motivation in the Sculptures of Mona the Saudi" to the study of an accomplished Arab sculptor with its varied sculptural activity between the works of the exhibition and the works of the squares, as well as its distinguished place among the contemporary Arab sculptors. This research is divided into four chapters:

     The first chapter deals with the general methodological framework of the research in terms of the research problem which is focused on the question: What is the hegemony and motivation in the sculptures of Mona Saudi? The importance of research and the need for it, including the technical scientific material concerned with the sculptural achievement of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 14 2020
Journal Name
Journal Of Mechanical Engineering Research And Developments
Noise effects in skill discretion and modeling
...Show More Authors

Diesel generators is widely used in Iraq for the purpose of maintaining electric power demand. Large number of operators engaged in this work encounters high level of noise generated by back pack type diesel generators used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known., in present research , quastionaire was adsministered 86 repondents in Baghdad city were exposured to wide range of noise level (80-110) dB(A) with different ages and they have different skill discretion levels. Noise levels A-weigthed decibles dB(A) were measured over 8 weeks two times aday during the 2019 summer using a sound level meter.For predicting the wo

... Show More
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref