With a descriptive and analytical approach, it discusses the concept of phenomenology as an approach to seeing the aesthetics of ugliness as one of the concepts associated with the aesthetic experience in contemporary art designs, as it is the result of communication between artistic production and the recipient, which leads to creating a state of aesthetic pleasure. A phenomenological method is used to uncover the aesthetics of ugly and to connect ugliness and beauty since ugliness in aesthetics incorporates beauty as a modern aesthetic vision from the phenomenological perspective. The study investigated aesthetics as a phenomenon of perception, sensory knowledge, and the aesthetic response to the production of designs in contemporary art, represented by achieving a status of aesthetic pleasure, and the phenomenological approach can be applied to see the aesthetics of ugliness in contemporary design, and there is a relationship between the aesthetics of ugliness and the aesthetic experience in producing contemporary design, and it reached the possibility of applying the phenomenological approach to appreciation and criticism with an aesthetic vision of ugliness, by transforming the influence of phenomenological thought as a method into an aesthetic concept. To build the design for a more in-depth vision in a new analytical reading, and to have a merit in the study and production of designs that began with the art of the event and ended as digital art with technical effects, with its components (intentionality).
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThis work discusses the beginning of fractional calculus and how the Sumudu and Elzaki transforms are applied to fractional derivatives. This approach combines a double Sumudu-Elzaki transform strategy to discover analytic solutions to space-time fractional partial differential equations in Mittag-Leffler functions subject to initial and boundary conditions. Where this method gets closer and closer to the correct answer, and the technique's efficacy is demonstrated using numerical examples performed with Matlab R2015a.
The theories and applications of speaker identification, recognition, and verification are among the well-established fields. Many publications and advances in the relevant products are still emerging. In this paper, research-related publications of the past 25 years (from 1996 to 2020) were studied and analysed. Our main focus was on speaker identification, speaker recognition, and speaker verification. The study was carried out using the Science Direct databases. Several references, such as review articles, research articles, encyclopaedia, book chapters, conference abstracts, and others, were categorized and investigated. Summary of these kinds of literature is presented in this paper, together with statistical analyses
... Show MoreThis study included partial purification of the lipase enzyme from the karnel of the pecan nut. After applying ion exchange chromatography technique using CM-Cellulose, two lipase isoenzymes were observed with specific activity values of 2.66 and 1.7 units/mg protein. The highest activity of both isoenzymes appeared at the optimum pH values of 8 and 6 and at temperatures of 40 and 50 °C, respectively. A pure single band was obtained by using electrophoresis technique and it was found that the approximate molecular weight was 42 kDa for the two isoenzymes. The study dealt with the preparation of the diester compound 1,4-diacetoxybenzene, which was diagnosed by GC-MS and 1H NMR spectrometry. When studying the inhibitio
... Show MoreA series of 4-(methylsulfonyl)aniline derivatives were synthesized in order to obtain new compounds as a potential anti-inflammatory agents with expected selectivity against COX-2 enzyme. In vivo acute anti-inflammatory activity of the final compounds 11–14 was evaluated in rat using an egg-white induced edema model of inflammation in a dose equivalent to 3 mg/Kg of diclofenac sodium. All tested compounds produced significant reduction of paw edema with respect to the effect of propylene glycol 50% v/v (control group). Moreover, the activity of compounds 11 and 14 was significantly higher than that of diclofenac sodium (at 3 mg/Kg) in the 120–300 minute time interval, while compound 12 expressed a comparable effect to that of di
... Show MoreTwo series of 1,3,4-oxadiazole derivatives at the sixth position of the 2,4-di-
Industrial development has recently increased, including that of plastic industries. Since plastic has a very long analytical life, it will cause environmental pollution, so studies have resorted to reusing recycled waste plastic (sustainable plastic) to produce environmentally friendly concrete (green concrete). In this research, producing environmentally friendly load-bearing concrete masonry units (blocks) was considered where five concrete mixtures were compressed at the blocks producing machine. The cement content reduced from 400 kg/m3 (B-400) to 300 kg/m3 (B-300) then to 200 kg/m3 (B-200). While (B-380) was produced using 380 kg/m3 cement and 20 kg/m3 nano-sil
... Show More