Find taught dimension aesthetic in the formation of post-modernism, which is one of the themes of aesthetics in the stream of postmodernism, is problematic because of the lack of provisions and fixed values reinforce the concept of beauty, and put done technical plastic in the circle of evaluation and judgment aesthetic, this research as an attempt to reveal the aesthetic concepts that can be drawn from artistic experiments in the formation of post-modernism, through the development of those concepts viable mainstream.
Search contains four chapters: the first chapter includes a general approach to the research, has been showcasing the research problem and the importance of research and goal of Search: detection dimension aesthetic in the formation of post-modernism, and then installed limits search time: the period between years 1950 2009 m, and the limits of spatial in Europe and America, as was the definition of the term (the aesthetic dimension) in determining the terms. Chapter II included: Axis philosophical and theoretical framework of the research, by identifying the philosophy of beauty in postmodern thought, and the review and discussion of philosophical dialogues. While includes Chapter III: The Search through measures identify the research community sample search tool search and research methodology, and then samples were analyzed sample (5) models, have been selected intentionality way represent the research community.
Chapter IV devoted to the search results, and was the most important results: the aesthetic dimension in the formation of postmodern sculpture is the concept of variable and variable (non-fixed), beauty depends on experimenting with new Technical Works. As it turns out that the aesthetic dimension of investigating the formation of postmodern sculpture through the active participation of elements of aesthetic experience: the sculptural work, the viewer, sculpture place. It turned out that to realize the beauty and sense it in the formation of postmodern sculpture, condenses by surprising and shocking achieved when people, through the continuous search for forms of strange and unconventional.
The current research aims to identify the level of parental treatment methods tolerance, hostility, strictness, and warmth, as well as the level of self-efficacy among middle school students. Moreover, it aims to identify the correlation relationship between the variables of parental treatment methods and self-efficacy among middle school students. The research sample included (150) middle school students. For achieving the objectives of the current research, the researchers adopted a scale of parental treatment methods prepared by (Zughair, 2006), and a scale of self-efficacy prepared by (Youssef, 2016), which were applied in their final form to the research sample. The research reached the following results: parents use a low-level hos
... Show Moreلا يزال المهتمون بلعبة كرة السلة يبحثون عن إيجاد الوسائل الأكثر أهمية وصولاً إلى ما تطمح إليه الدول لتحقيق افضل المستويات في نواحي اللعبة كافة من خلال التغلب على المعوقات التي تحول دون تقدمها إلى الأمام بالدراسة والبحث. ومن هذا المنطلق انصب البحث في ضرورة معالجة القصور الناتج عن عدم وجود المستويات المعيارية ذات العلاقة باختبارات قدرات اللاعبين وعلى وفق مراكز اللعب ولا سيما المهارية الهجومية، ومما شكل ذلك ضع
... Show MoreThe present study aims at scrutinizing the impoliteness types, causes, and purposes utilized by Iraqi English language learners when refusing marriage proposals. Thus, it attempts to answer the questions: (1) what are the impoliteness formulas used by the Iraqi learners of English in refusing marriage proposals?, and (2) What are their impoliteness triggers/causes and the purposes? The study is significant in bridging the gap that few linguistic types of research concentrate on studying intentionality and emotions allied with impoliteness. Data were collected from 35 Iraqi learners of English responding to 6 situations of marriage. The data were analyzed using Culpeper’s (2011) formulas of impoliteness and Bousfield’s (2007) impolite
... Show MorePhotovoltaic devices (PVs) were fabricated by spray-coating an ink of copper indium diselenide CuInSeR 2 R(CIS) nanocrystals as the light-absorbing layer. Without high-temperature post-deposition annealing, PVs were made on glass substrates with power conversion efficiencies of up to 1.5% and 0.9%, for Au and Mo coated respectively, under AM 1.5 illumination. UV–Vis spectrophotometer in the wavelength range 350–1500 nm. X-ray diffraction (XRD) and energy dispersive spectroscopy (EDS) analysis it is evident that CuInSeR 2 R have the chalcopyrite structure as the major phase and no secondary phase with a preferred orientation along (112) direction and The atomic ratio of Cu : In : Se in the nanocrystals is nearly 1 : 1 : 2.
The researcher studied transportation problem because it's great importance in the country's economy. This paper which ware studied several ways to find a solution closely to the optimization, has applied these methods to the practical reality by taking one oil derivatives which is benzene product, where the first purpose of this study is, how we can reduce the total costs of transportation for product of petrol from warehouses in the province of Baghdad, to some stations in the Karsh district and Rusafa in the same province. Secondly, how can we address the Domandes of each station by required quantity which is depending on absorptive capacity of the warehouses (quantities supply), And through r
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreAbstract The goal of current study was to identify the relationship between addiction of self-images (Selfie) and personality disorder of narcissus, and the difference of significance the relationship between addiction self-images (selfie) and personality disorder narcissus at students of Mustansiriya university, addiction self- images (selfie) defined: a photograph that one has taken of oneself, typically one taken with a smartphone or webcam and shared via social media, edit and down lowed to social networking sites, and over time, the replacement of normal life virtual world, which is accompanied by a lack of a sense of time, and the formation of repeated patterns increase the risk of social and personal problems. To achieve the goals
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More