Preferred Language
Articles
/
jcofarts-1307
Phenomenology as an approach to seeing the aesthetics of ugliness in contemporary art designs
...Show More Authors

With a descriptive and analytical approach, it discusses the concept of phenomenology as an approach to seeing the aesthetics of ugliness as one of the concepts associated with the aesthetic experience in contemporary art designs, as it is the result of communication between artistic production and the recipient, which leads to creating a state of aesthetic pleasure. A phenomenological method is used to uncover the aesthetics of ugly and to connect ugliness and beauty since ugliness in aesthetics incorporates beauty as a modern aesthetic vision from the phenomenological perspective. The study investigated aesthetics as a phenomenon of perception, sensory knowledge, and the aesthetic response to the production of designs in contemporary art, represented by achieving a status of aesthetic pleasure, and the phenomenological approach can be applied to see the aesthetics of ugliness in contemporary design, and there is a relationship between the aesthetics of ugliness and the aesthetic experience in producing contemporary design, and it reached the possibility of applying the phenomenological approach to appreciation and criticism with an aesthetic vision of ugliness, by transforming the influence of phenomenological thought as a method into an aesthetic concept. To build the design for a more in-depth vision in a new analytical reading, and to have a merit in the study and production of designs that began with the art of the event and ended as digital art with technical effects, with its components (intentionality).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 27 2020
Journal Name
Journal Of The College Of Education For Women
The Effect of Using Online Automated Feedback on Iraqi EFL Learners’ Writings at University Level
...Show More Authors

Feedback on students’ assignments can be done in many different ways. Nowadays, the growing number of students at universities has increased the burden on the instructors to give feedback on students’ writings quickly and efficiently. As such, new methods of modern online automated feedback tools, such as Hemingway app and ecree,are used to assist and help instructors. Hence, this research is an explanatory study to examine the effect of using the online automated feedback on some Iraqi EFL learners’ writings at the university level. The study comprised 60 students enrolled in an English language course at the University of Anbar. They were divided randomly into two groups, experi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Jan 13 2023
Journal Name
Atmosphere
Impact of North African Sand and Dust Storms on the Middle East Using Iraq as an Example: Causes, Sources, and Mitigation
...Show More Authors

This study aims to determine the reasons for the increase in the frequency of sand and dust storms in the Middle East and to identify their sources and mitigate them. A set of climatic data from 60 years (1960–2022) was analyzed. Sand storms in Iraq are a silty sand mature arkose composed of 72.7% sand, 25.1% silt, and 2.19% clay; the clay fraction in dust storms constitutes 70%, with a small amount of silt (20.6%) and sand (9.4%). Dust and sand storms (%) are composed of quartz (49.2, 67.1), feldspar (4.9, 20.9), calcite (38, 5), gypsum (4.8, 0.4), dolomite (0.8, 1.0), and heavy minerals (3.2, 6.6). Increasing temperatures in Iraq, by an average of 2 °C for sixty years, have contributed to an increase in the number of dust storm

... Show More
View Publication Preview PDF
Crossref (36)
Crossref
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Gingival Marginal Leakage of Different Tooth Colored Materials Combination as an Intermediate Layer in Class II Composite Restoration (A Comparative In Vitro Study)
...Show More Authors

Background: The aim of this in vitro study was to evaluate and compare the microleakage between Vertise Flow T M composite material and other conventional (Filtek Z250, riva light cure and SDR) composite materials when restoring CII mesial box only cavity at gingival margin through die penetration test Materials and methods: Forty maxillary first premolars were prepared with class II box design only cavities. Samples were divided into four groups of ten teeth according to material used: group I (FiltekZ250 only). Group II (SDR+FiltekZ250). Group III (Vertise Flow +FiltekZ250). Group IV (Riva light cure+ FiltekZ250). After 24 hrs. immersion in 2% in methylene blue, samples were sectioned and micro leakage was estimated. Results: None of the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Journal Of Economics And Administrative Sciences
Inclusive leadership in the General Secretariat for the Council of Ministers - An analytical research
...Show More Authors

The current research aims to evaluate the level of inclusive leadership within the General Secretariat for the Council of Ministers, and its role in achieving integration in work through the need to improve relationships between different administrative levels, facilitate participation, expression of opinions, and belonging to the organization. In order to achieve the research objective, the descriptive analytical statistical method was chosen using the SPSS V.25 programs, with various statistical methods and measures, including mean, standard deviation, variance coefficient, relative importance, and simple regression, through a questionnaire tool for data collection. The research community included the leadership in the sample of resear

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
The functional diversity of the directorial vision in the political theater cinema as a model
...Show More Authors

It is very necessary for the political theater to be within the space of every theatrical performance, so that the theater carries the diverse and enlightened values and cultures of this world. political theatre. In the first chapter, the researcher dealt with (the methodological framework), which includes the research problem identified by the researcher with the following question (the functional diversity of the directorial vision in the political theater)
Importance, purpose, limits and seal by defining terminology.
In the second chapter, the researcher dealt with the theoretical framework on two topics, the first (transformations of directorial vision in theatrical performance) and the second topic (aesthetic experiences i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 04 2025
Journal Name
Magazine Aldhakwat Albedh
The impact of atheism on the individual and society, Iraq as a model
...Show More Authors

Atheists have spread in the modern era, so that atheism has become a bad phenomenon in the world in general and in Islamic societies in particular, so the research aims to study the individual and social effects left by atheism on the atheists themselves, and the research included multiple axes: atheism linguistically and idiomatically, atheism in the Qur’an Noble and Modern (and Contemporary) Atheism Statistics: and the reasons for atheism: Studying the phenomenon of atheism in Iraq as a model, then studying the effects of atheism: on the individual first, then atheism and its impact on society, then the conclusion, recommendations, sources and references

View Publication Preview PDF
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Quantum Theory of Atom in Molecules Investigation Trinuclear Ruthenium: DFT Approach
...Show More Authors

The topological indices of the "[(µ3-2, 5-dioxyocyclohexylidene)-bis ((2-hydrido)-nonacarbonyltriruthenium]” were studied within the quantum theory of atoms in the molecule (QTAIM), clusters are
analyzed using the density functional theory (DFT). The estimated topological variables accord with prior
descriptions of comparable transition metal complexes. The Quantum Theory of Atom, in molecules
investigation of the bridging core component, Ru3H2, revealed critical binding points (chemical bonding)
between Ru (1) and Ru (2) and Ru (3). Consequently, delocalization index for this non-bonding interaction
was calculated in the core of Ru3H2, the interaction is of the (5centre–5electron) class.

View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Procedia Economics And Finance
The Mediating Role of Knowledge Sharing on Relationship between IT Capability and IT Support as Predictors of Innovation Performance: An Empirical Study on Mobile Companies in Iraq
...Show More Authors

View Publication Preview PDF
Crossref (18)
Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages (jcl)
The Existential Dilemma as a Philosophical Problem in The Beggar by Naguib Mahfouz
...Show More Authors

     The Beggar (1965) is a story of isolation and depression which is written by the Egyptian novelist Naguib Mahfouz who is considered the father of Arabic Literature in the modern era. Specifically, he refers in his great novel called The Beggar that the man unable to achieve psychological revival after Nasser’s revolution, the man sacrificed his own job and his family for a desire that increases his feelings of alienation and depression which leads him to an emotional outcry against the indifferent. The main aim of the study highlights the concept of existential dilemma as a philosophical problem and personality crisis by the protagonist of The Beggar novel, Omer Al-Hamzawi who had acc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref