This study aims to deliver the woman’s image and to unveil on how to be introduced in the TV series. The research is based on the survey method-using content analysis tool. The research sample represented in the TV series produced by the IMN, which were displayed in 2014 and used the pattern of Margaret Gallagher to analyze the content of the series in accordance with the frame analysis theory.
The study came up with declination of the woman’s representation compared with man in Iraqi TV drama, also the study finds that the series introduced the woman according to the personal, social, political, and economic frames in a standardizing method. It focuses on the characteristics always attributed to it as showing her obedient of the social role and restrained with the customs and traditions and relies on the man and her goals are related with the man except few roles, which bracken such routine.
A new computer-generated optical element called a monochrome image hologram (MIH) is described. A real nonnegative function to represent the transmittance of a synthesized hologram is used. This technique uses the positions of the samples in the synthesized hologram to record the phase information of a complex wavefront. Synthesized hologram is displayed on laser printer and is recorded on a film. Finally the reconstruction process is done using computerized .
Photo citation request in examples Of ascetic poetry in the first Abbasid era
Strategic leadership is the main source to enable organizations of excellence in light of turbulent environment, it is also the capabilities of organizational renewal organization’s ability to anticipate changes that take place or possible occurrence.
As a result of the many changes that characterize the environment where they operate researched hospitals, many of them began looking for ways to help it achieve a lot of their own competitive advantages.
The subject of organizational renewal capabilities of subjects that are not obvious interest in the Arab environment in general and Iraq in particular, and longer. The problem of the research and field presence of deficiencies in
... Show MoreAfter Hamdallah and his success on the realization of this manuscript (a message in the corporal proof and physical cramping of the deceased Imam Qunawi 1195 AH study and investigation: I will review some of the results reached in the realization of this manuscript:
1. Collect the majority of scholars and interpreters that the physical and spiritual remodeled and walnut interpretation of spiritual enemy has violated the consensus is the doctrine of the philosophers appellant is not accustomed to it.
2. What the manuscript said that the prophets peace be upon him who preceded our Prophet Muhammad peace be upon him as Moses peace be upon him that he did not mention the physical hostile and did not descend it in the Torah, as well as
β-thalassaemia consists of 3 chief forms: thalassaemia primary (other called "cooley's Anaemia" or "Mediterranean durability Anaemia"), thalassaemia intermedia or thalassaemia minor also frequent termed "β-thalassaemia carrier", "β-thalassaemia trait" however, "heterozygous β-thalassaemia". separately from the rare magisterial forms, problem along β-thalassaemia essential are homozygotes or made heterozygotes because B0 and B+ genes, problem including thalassaemia intermedia are typically homozygotes and compound heterozygotes then subjected with thalassaemia minor are broadly heterozygotes.
In this study, we t
... Show MoreThe present study aimed to investigate the effect of re-operations engineering business in continuous improvement, as the rapid development of service activities generally private and the great diversity in the goals of its operations and programs of the university and the service has led to the increasing importance of re-operations engineering business as well as continuous improvement so began to study the relationship between the re engineering and continuous improvement of university service, and applied study on a sample of professors from the faculties of administration, economics and law. Find and reach to several conclusions, notably that the preparation of the teaching staff training sessions on how to use modern teaching
... Show More
Social networking sites have become very popular since the beginning of the current decade and have become linked to our daily life. We follow the news, Analyses and opinions on the one issue in a way that attracts millions of users and the number grows every secon On Twitter, one of the most important social networking sites, all social groups rushed from the president to the last citizen to open accounts when they found themselves forced to do so . During the recent Gulf crisis, Twitter was buzzing with Twitter, which achieved the largest circulation globally. Instead of serving the issue and directing it to serve the Arab interest, most of the publications were on th |
Background: Folic acid (vitamin B9) is one of the important vitamins that are necessary for growth and development of the embryo and preventing the occurrence of congenital malformations which are one of the important health problems in the developing countries and the world as it has a direct effect on the affected babies, their families and the community. It affects an estimated 3% of newborns worldwide.Periconceptional supplementation with folic acid (before conception and during the first 12 weeks of pregnancy) was found to decrease many important types of these anomalies. Objectives: The aim of this study is to assess knowledge, attitude and practice of periconceptional use of folic acid in pregnant women who are attending antenatal
... Show MoreSteganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show More