The relationship between music and plastic arts can be viewed as an interdependent relationship, as they both develop imagination, focus and sensory perception, as well as the presence of some artistic concepts that music shares with the art of drawing, on this basis the rationale for this research aimed at identifying (the influence of music) was dealt with On the artistic output (drawing) of students of the Department of Art Education - College of Fine Arts) In the first chapter the problem of research, importance, terminology, boundaries and goal was addressed, and in the second chapter the researcher dealt with in the first topic the relationship between music and painting, and in the second topic the use of music in education. As for the third chapter in the research procedures, the researcher chose the descriptive approach to achieve the goal of the research, and she selected a sample of the fourth stage students in the Department of Art Education in the Faculty of Fine Arts at the University of Diyala. Drawing and students who do not use music, and after getting acquainted with that, the researcher prepared a form for analyzing the paintings. Two for the group that listens to music and two paintings for the group that does not listen to music while drawing chose four paintings. After analyzing these paintings for both groups, the researcher reached a number of results the most important ones are:
1. The panels for students who listen to music show rhythm and harmony. As for students who did not listen to music, these elements did not appear.
2. There is harmony, coordination and interaction in the use of color and its gradations in the work of students who listen to music, while this color interaction did not appear clearly in the work of students who do not listen to music.
3. The distribution of shapes, blocks and lines appeared harmoniously in the work of students who listen to music while drawing, while the contradiction and rigid nature appeared in the work of students who did not listen to music. This research was concluded with recommendations and a list of sources. Key words: listening, music, mirroring.
A new generalizations of coretractable modules are introduced where a module is called t-essentially (weakly t-essentially) coretractable if for all proper submodule of , there exists f End( ), f( )=0 and Imf tes (Im f + tes ). Some basic properties are studied and many relationships between these classes and other related one are presented.
Background:: Infertility is a very common condition affecting approximately 13-14% of couples in the reproductive age. In general population; about 85% of couples have achieved conception within a year. Intrauterine insemination is one of the procedure which have a role in the treatment of infertile couple.Objectives:is to confirm that the use of ovulation induction in the course of intrauterine insemination elevates the pregnancy success rate.Method:This study had been conducted between December 2013 till December 2014 in AL-Elwiyah maternity hospital and AL-Samaraii hospital / Baghdad.On history and clinical examination; the chosen couple had the following criteria; primary infertility for more than one year, no previous IUI trials, hu
... Show MoreThe ground state proton, neutron and matter densities and
corresponding root mean square radii of unstable proton-rich 17Ne
and 27P exotic nuclei are studied via the framework of the twofrequency
shell model. The single particle harmonic oscillator wave
functions are used in this model with two different oscillator size
parameters core b and halo , b the former for the core (inner) orbits
whereas the latter for the halo (outer) orbits. Shell model calculations
for core nucleons and for outer (halo) nucleons in exotic nuclei are
performed individually via the computer code OXBASH. Halo
structure of 17Ne and 27P nuclei is confirmed. It is found that the
structure of 17Ne and 27P nuclei have 2
5 / 2 (1d ) an
BACKGROUND: Sickle cell nephropathy, a heterogeneous group of renal abnormalities resulting from complex interactions of sickle cell disease (SCD)-related factors and non-SCD phenotype characteristics, is associated with an increased risk for morbidity and mortality. AIMS: The aims of this study were to determine the frequency of microalbuminuria (MA) among pediatric patients with SCD and to determine risk factors for MA among those patients. SUBJECTS AND METHODS: A case–control study was carried out on 120 patients with SCD, 2–18 years old, registered at Basrah Center for Hereditary Blood Diseases, and 132 age-and sex-matched healthy children were included as a control group. Investigations included complete blood panel, blood urea, se
... Show MoreGallstone disease is one of the most common complications among diabetic patients especially type 2 DM. Till now, there is no specific and certain factor that explain the incidence of gallstones among type 2 diabetic patients and many risk factors are taken collectively to estimate its intensity and severity compared to non diabetic counter parts. This clinical study was designed to evaluate and report the incidence and severity of gallstones among type 2 diabetics and non diabetics regarding certain factors. 20 diabetic females and 20 diabetic males were collected as patients′ group and have had gallstones while 20 females and 20 males who have had gallstones without diabetes mellitus type 2 were collected as controls′ group
... Show MoreIraq is considered one of the countries most susceptible to the negative impacts of climate change. According to international reports, it is classified as among the top five most affected by climate change in the world, leading to economic resource shortages and an increase in water scarcity, which exposes societal stability in Iraq to a threat. This may result in social disintegration and civil conflicts, so climate changes are considered one of the most dangerous crises affecting societal stability in Iraq during this stage. In this context, the research attempts to trace the causes of climate change and their effects on societal stability in Iraq and suggest some necessary measures to confront them in the future. The resea
... Show MoreBackground: This study aims to determine whether cigarette smoking and anxiety degrees are related among nurses. Methods: A correlation design study was conducted at Baquba Teaching Hospital in Diyala Governorate, and the study period extended from September 10th, 2023, to January 28th, 2024. A nonprobability purposive sample was used to include 200 nurses working at Baquba Teaching Hospital, Iraq. Data were collected using a self-administered questionnaire from January 10th to February 7th, 2024. There were two components to the study instruments. Initially, the demographic sheet contained the individuals' sociodemographic data. The Taylor manifest anxiety scale is included in the second section. The collected data were analyzed us
... Show MoreRecently, the development and application of the hydrological models based on Geographical Information System (GIS) has increased around the world. One of the most important applications of GIS is mapping the Curve Number (CN) of a catchment. In this research, three softwares, such as an ArcView GIS 9.3 with ArcInfo, Arc Hydro Tool and Geospatial Hydrologic Modeling Extension (Hec-GeoHMS) model for ArcView GIS 9.3, were used to calculate CN of (19210 ha) Salt Creek watershed (SC) which is located in Osage County, Oklahoma, USA. Multi layers were combined and examined using the Environmental Systems Research Institute (ESRI) ArcMap 2009. These layers are soil layer (Soil Survey Geographic SSURGO), 30 m x 30 m resolution of Digital Elevati
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More