The sense of motion generates a sense of the subject of action. The movement of the camera, the movement of actors, the movement of colors and lights, and other elements of the visual discourse, work together to enrich the image with a complete dynamic flow to reach the recipient. The research subject has been identified under the title "Motion Scenes Dramatic Treatment in TV Drama". The research is divided into an introduction and two theoretical sections in the theoretical framework:
The first section: The motion in TV drama in which the researcher dealt with the concept of motion and its types and the expressive and aesthetic role in television drama. The second section dealt with the elements of the visual a
... Show MoreKE Sharquie, SA Al-Mashhadani, AA Noaimi, MY Abbas, Journal of the Saudi Society of Dermatology & Dermatologic Surgery, 2011 - Cited by 5
Background: Osteoid osteoma(OO) is a relatively common benign skeletal neoplasm of unknown etiology that is composed of osteoid and woven bone, usually seen in adolescent and young males Although, the clinical, radiological and scintigraphic features of OO have been well described, these features may be misleading or altered in the cases of lesser trochanter of the femur which is relatively uncommon location for OO with a few number of cases reported up to date.Case Presentation: We report a case of a 20-year-old man who presented with painful limpThe pain had begun six months earlier and was made worse by walking and by exercise., with normal initial X-rays .The diagnosis was made after six months when typical Computed tomography, magne
... Show MoreVisceral leishmaniasis (VL) is a parasitic infection caused by an intracellular growth of Leishmania spp. in macrophage cells. The autoimmune disorder is a condition takes place when the immune system produces antibodies which incorrectly attacked its own body tissues. VL has been involved as an effect or on the autoimmune aspect. This study was conducted to identify the auto antibodies profile in patients infected with VL. The presences of auto antibodies in 21 Iraqi children infected with VL were tested for laboratory autoimmune aspect. The highest percentage of seropositive in Leishmania patients was observed for anti-ds DNA, anti-Mi-2, anti-Ku and anti-PCNA antibodies (90.5%, 90.5%, 90.5% and 61.9%) respectively, while the lowest percen
... Show MorePhonological metathesis can be defined as an alternation in the normal sequence of two sounds under certain conditions. The present paper is intended to give a detailed synchronic description of phonological metathesis in Iraqi Arabic dialect. For data collection, the researchers have adopted two naturalistic techniques, viz., observation and notes taking. A synchronic analysis is carried out to provide some evidence that describe the sequential change of phonological metathesis in the dialect under investigation. Such sequential changes of metathesized sounds are presented and tabulated. The study concludes with the following finding that this process is not limited to cases where two consonant sounds are transposed, but three consonant
... Show MoreBecause the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulat
... Show MoreNatural convection in a trapezoidal enclosure with partial heating from below and symmetrical cooling from the sides has been investigated numerically. The heating is simulated by a centrally located heat source on the bottom wall, and four different values of the dimensionless heat source length, 1/5, 2/5, 3/5, 4/5 are considered. The laminar flow field is analyzed numerically by solving the steady, two-dimensional incompressible Navier-Stokes and energy equations. The Cartesian velocity components and pressure on a collocated (non-staggered) grid are used as dependent variables in the momentum equations discretized by finite volume method; body fitted coordinates are used to represent the trapezoidal enclosure, and grid generatio
... Show MoreThe image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding o
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More