Preferred Language
Articles
/
jcofarts-67
Guernica Semiotics… methods of Expression between Aesthetic and Semantic Composition
...Show More Authors

This semiotic analytical study has shown that there is a wide diversity in the aesthetic systems and the ranges of reception for the rhetoric and the discourse. The fertility of this semiotic conceptual system monitored this new mature, innovative and advanced level of this new critical analytical method with its different technical and theoretical foundations. Thus, it opened the door wide to new discoveries in the laws, which motivate different artistic texts. Finally, the research is just a start. Can the linguistic methods read the artistic works outside the linguistic authorities? Is it possible to capture the structural transformation in Picasso drawings? Semiotically another researcher in another method (such as deconstruction) can take that. This makes multiple readings a source of richness to discover the impact and highlight the painting, which is still universally appreciated, in terms of art and significance. The study dealt with an introduction and a theoretical foundation that consisted of: the roots of the painting, the social context, the specificity of the composition and the methods of composition of Picasso. After analyzing the sample, the research reached a set of results, the most important of which are:
The shapes and marks in this painting are reflected in two communicative values:
The first is the meaning, which can be done in the act of communication and the act of saying through the continuous and renewed broadcast of the discourse of the painting in every stage and era.
The second is through the aesthetic forms that are self-contained that it is not necessary to be a container carrying a certain message (transferring a historical document of battle or war).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Comparison of Single and Group Bored Piles Settlement Based on Field Test and Theoretical Methods
...Show More Authors

 Bored piles settlement behavior under vertical loaded is the main factor that affects the design requirements of single or group of piles in soft soils. The estimation of bored pile settlement is a complicated problem because it depends upon many factors which may include ground conditions, validation of bored pile design method through testing and validation of theoretical or numerical prediction of the settlement value. In this study, a prototype single and bored pile group model of arrangement (1*1, 1*2 and 2*2) for total length to diameter ratios (L/D) is 13.33 and clear spacing three times of diameter, subjected to vertical axial loads. The bored piles model used for the test was 2000

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of The College Of Education For Women
The aesthetic formation of metaphor Textual reading in the office of Majd al-Din al-Nashabi (D. 656 A.H)
...Show More Authors

وظَّفَ الشاعرُ مجد الدين النُّشَّابي الصورة الاستعارية التي شكلت سمةً جمالية بارزة من سماتِ التشكيل الشعري عنده, وأحد المكونات الأساسية في بنية قصائده الشعرية وهي جوهر الإبداع ومحط التذوق عند المتلقي, إذ يشكل الشاعر صوره الاستعارية المتنوعة متولدة من خياله وعواطفه ومتوافقة مع الموضوع لتصبح الصورة  الاستعارية ركنًّا من أركان التشكيل الفني الشعري عند الشاعر .

والتصوير الاستعاري له القدرة بالتشكيل ا

... Show More
View Publication Preview PDF
Publication Date
Sun May 10 2015
Journal Name
Al-academy
Outstanding aesthetic decoration in the doors of the holy shrines (shrine of Imam Hussein, model): ماهر حسين علي الحبوبي
...Show More Authors

The problem of the search (how to employ own aesthetic values sculpture prominent decorations doors in the holy shrines) as research aims to detect these formulas employed in relief sculpture in accordance with the aesthetic values of the decorations that add structure in the form of doors shrines dimensions of functional and aesthetic and expressive By selecting the general system configurations spaces for doors and select the components of the structural configurations decorative prominent types (geometric and floral and linear and composite) as well as identify the techniques adopted in the executive configurations doors at the level of raw materials and processors show. Find and define the beauty of decorative formations prominent of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 13 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Photographic Analysis of Macro- Aand Micro-Aesthetic Appearance in a Sample of Iraqi Adults With Class I Normal Occlusion
...Show More Authors

ABSTRACT Background: Generally, the facial esthetics depends on the esthetic appearance of the maxillary anterior teeth. The purposes of this study were to analyse the macro-aesthetic appearance of the face and the micro-aesthetic appearance of the maxillary anterior teeth to establish the normative values for class I normal occlusion and to detect possible gender differences. Materials and methods: The sample consisted of 120 Iraqi adults (60 males and 60 females) aged (18-23) years. Each individual was clinically examined, then with cephalostat based head position, extraoral and intraoral photographs were taken for each subject. The facial and dental measurements were measured using AutoCad program 2014. Descriptive statistics was obtaine

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jun 30 2017
Journal Name
International Journal Of Medical Research & Health Sciences
FLI1 Expression in Breast Cancer Cell Lines and Primary Breast Carcinomas is Correlated with ER, PR and HER2
...Show More Authors

FLI1 is a member of ETS family of transcription factors that regulate a variety of normal biologic activities including cell proliferation, differentiation, and apoptosis. The expression of FLI1 and its correlation with well-known breast cancer prognostic markers (ER, PR and HER2) was determined in primary breast tumors as well as four breast cancer lines including: MCF-7, T47D, MDA-MB-231 and MDA-MB-468 using RT-qPCR with either 18S rRNA or ACTB (β-actin) for normalization of data. FLI1 mRNA level was decreased in the breast cancer cell lines under study compared to the normal breast tissue; however, Jurkat cells, which were used as a positive control, showed overexpression compared to the normal breast. Regarding primary breast carcinoma

... Show More
Preview PDF
Publication Date
Mon Jun 30 2025
Journal Name
Mustansiriyah Journal Of Pure And Applied Sciences
Several developed and modern methods for estimating some anti-inflammatory drugs
...Show More Authors

     With the increasing use of antibiotics around the world, the study and appreciation of antibiotics has become essential. An antibiotic formulation may include one or added active ingredients depending on the type and method of manufacturing the antibiotic. Antibiotics can only combat diseases of bacterial origin. As for viral diseases such as the common cold and influenza, antibiotics will not be able to combat them. The objective of this review is to digest the literature related to estimation of antibiotics and to show the methods that have been used in the estimation of the antibiotics (amoxicillin, ampicillin, cephalothin, carbenicillin, and cefotaxime) in medicinal preparations and a biological fluid for example blood

... Show More
View Publication
Crossref
Publication Date
Sat Jul 15 2023
Journal Name
2023 6th International Conference On Engineering Technology And Its Applications (iiceta)
Methodology for the Design and Programming Methods for a Smart Home
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Mon Jun 07 2021
Journal Name
Jurnal Teknologi
MODELS, DETECTION METHODS, AND CHALLENGES IN DC ARC FAULT: A REVIEW
...Show More Authors

The power generation of solar photovoltaic (PV) technology is being implemented in every nation worldwide due to its environmentally clean characteristics. Therefore, PV technology is significantly growing in the present applications and usage of PV power systems. Despite the strength of the PV arrays in power systems, the arrays remain susceptible to certain faults. An effective supply requires economic returns, the security of the equipment and humans, precise fault identification, diagnosis, and interruption tools. Meanwhile, the faults in unidentified arc lead to serious fire hazards to commercial, residential, and utility-scale PV systems. To ensure secure and dependable distribution of electricity, the detection of such ha

... Show More
View Publication
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Jan 04 2021
Journal Name
Iium Engineering Journal
RELIABLE ITERATIVE METHODS FOR SOLVING 1D, 2D AND 3D FISHER’S EQUATION
...Show More Authors

In the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H

... Show More
View Publication
Crossref (2)
Crossref