Find taught dimension aesthetic in the formation of post-modernism, which is one of the themes of aesthetics in the stream of postmodernism, is problematic because of the lack of provisions and fixed values reinforce the concept of beauty, and put done technical plastic in the circle of evaluation and judgment aesthetic, this research as an attempt to reveal the aesthetic concepts that can be drawn from artistic experiments in the formation of post-modernism, through the development of those concepts viable mainstream.
Search contains four chapters: the first chapter includes a general approach to the research, has been showcasing the research problem and the importance of research and goal of Search: detection dimension aesthetic in the formation of post-modernism, and then installed limits search time: the period between years 1950 2009 m, and the limits of spatial in Europe and America, as was the definition of the term (the aesthetic dimension) in determining the terms. Chapter II included: Axis philosophical and theoretical framework of the research, by identifying the philosophy of beauty in postmodern thought, and the review and discussion of philosophical dialogues. While includes Chapter III: The Search through measures identify the research community sample search tool search and research methodology, and then samples were analyzed sample (5) models, have been selected intentionality way represent the research community.
Chapter IV devoted to the search results, and was the most important results: the aesthetic dimension in the formation of postmodern sculpture is the concept of variable and variable (non-fixed), beauty depends on experimenting with new Technical Works. As it turns out that the aesthetic dimension of investigating the formation of postmodern sculpture through the active participation of elements of aesthetic experience: the sculptural work, the viewer, sculpture place. It turned out that to realize the beauty and sense it in the formation of postmodern sculpture, condenses by surprising and shocking achieved when people, through the continuous search for forms of strange and unconventional.
The current paper aims to identify potential factors associated with employees’ intentions to leave information and communication technology companies in Iraq. There is evident variability in the literature regarding these factors; hence, a factor analysis approach was employed to identify these factors within the surveyed environment. Due to the difficulty in precisely delineating the size of the research population, a purposive sampling method was employed to reach an appropriate number of respondents within the aforementioned companies. A total of 288 employees responded to the survey conducted via Google Forms. The test results revealed the presence of five primary factors associated with employees’ intentions to leave, name
... Show MoreDetecting and subtracting the Motion objects from backgrounds is one of the most important areas. The development of cameras and their widespread use in most areas of security, surveillance, and others made face this problem. The difficulty of this area is unstable in the classification of the pixels (foreground or background). This paper proposed a suggested background subtraction algorithm based on the histogram. The classification threshold is adaptively calculated according to many tests. The performance of the proposed algorithms was compared with state-of-the-art methods in complex dynamic scenes.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreInundation floodingmap aimedto find outearly warningsto avoidenvironmental damageandhumanin terms of theheight ofthe wave ofwater, speed time arrival, effects of inundation sideanddepth of the water/ distanceand reduce the impact of the flood wave after obtaining the process of collapse of the dam in the lower part of the river to the dam area. The study has been using a numerical model one-dimensional depends on the development of equations (Saint-Venant) so that parts of the river, any river channel main banks of the right and left treated as separate parts, that’s the difference in the characteristics of the hydraulic and engineering, along the line of the flow will take into account in each section of the sections and flow in the riv
... Show Moreلا يزال المهتمون بلعبة كرة السلة يبحثون عن إيجاد الوسائل الأكثر أهمية وصولاً إلى ما تطمح إليه الدول لتحقيق افضل المستويات في نواحي اللعبة كافة من خلال التغلب على المعوقات التي تحول دون تقدمها إلى الأمام بالدراسة والبحث. ومن هذا المنطلق انصب البحث في ضرورة معالجة القصور الناتج عن عدم وجود المعايير ذات العلاقة باختبارات قدرات اللاعبين وعلى وفق مراكز اللعب ولا سيما المهارية الهجومية مما شكل ذلك ضعفاً في أعداد و
... Show MoreBackground: Personality could be defined broadly as those characteristics of individuals that describe the pattern of feeling, cognition and behaving. Personality types can be measured by using one of personality type’s measures. Personality has been proposed to influence the oral health. The purpose of the present study was to assess the influence of Personality Types on caries experience in relation to salivary testosterone hormone among teachers in Baghdad city. Materials and Methods: Female teachers (n=534) of randomly selected schools were subjected to personality questionnaire using The Riso-Hudson Enneagram Type Indicator. Teachers were examined to estimate the caries experience according to the decayed-missing and filled i
... Show MoreContents IJPAM: Volume 116, No. 3 (2017)
Atmospheric transmission is disturbed by scintillation, where scintillation caused more beam divergence. In this work target image spot radius was calculated in presence of atmospheric scintillation. The calculation depend on few relevant equation based on atmospheric parameter (for Middle East), tracking range, expansion ratio of applied beam expander's, receiving unit lens F-number, and the laser wavelength besides photodetector parameter. At maximum target range Rmax =20 km, target image radius is at its maximum Rs=0.4 mm. As the range decreases spot radius decreases too, until the range reaches limit (4 km) at which target image spot radius at its minimum value (0.22 mm). Then as the range decreases, spot radius increases due to geom
... Show Moreأن لعبة كرة السلة في تقدم وتطور مستمر حالها في ذلك حال الألعاب الرياضية الأخرى حيث أن الفضل في ذلك يعود إلى المعرفة بالعلوم المختلفة وكذلك البحث العلمي من اجل تحقيق نتائج متقدمة تنشدها معظم الدول ومنها العراق على الصعيد المحلي والعربي والدولي. ومما لاشك فيه أن متطلبات تطور مستوى نتائج القدرات البدنية في أيُة لعبة مرتبطة بالبرمجة والتخطيط الصحيح للمناهج التدريبية إذ تقودنا هذه الحقيقة إلى إجراء المزيد من الا
... Show More