The research seeks to examine the image of women in Iraqi films produced after 2003 over the answer to questions such as “ level of the representation of women and appearing in films and features that are attributable to them and their relationships with men and their interests and tendencies , activities and ways and methods pursued to achieve their goals , or what appeared to be trying to achieve and whether made movies vivid and varied models for women, or confined to a rigid model and duplicate Is films raised issues concerning women? The research seeks to examine the image of women in Iraqi films produced after 2003 over the answer to questions such as “ level of the representation of women and appearing in films and features that are attributable to them and their relationships with men and their interests and tendencies , activities and ways and methods pursued to achieve their goals , or what appeared to be trying to achieve and whether made movies vivid and varied models for women, or confined to a rigid model and duplicate Is films raised issues concerning women? The research is trying to find out that if there was a transformation in the image produced on women in Iraqi cinema after 2003 after the transfer of the film industry in Iraq from the confines of the state and its control over symbol industry codes to circulation space of international support through various cultural, artistic and political organizations.
Statistical learning theory serves as the foundational bedrock of Machine learning (ML), which in turn represents the backbone of artificial intelligence, ushering in innovative solutions for real-world challenges. Its origins can be linked to the point where statistics and the field of computing meet, evolving into a distinct scientific discipline. Machine learning can be distinguished by its fundamental branches, encompassing supervised learning, unsupervised learning, semi-supervised learning, and reinforcement learning. Within this tapestry, supervised learning takes center stage, divided in two fundamental forms: classification and regression. Regression is tailored for continuous outcomes, while classification specializes in c
... Show MoreThe study concerned the embryonic development of spinal cord of white choeked bulbul Pycnonotus leucotis. The spinal cord at the age 40 hour’s incubation from the neural tube and its tissue wall is composed of two layers, the ependymal layer and mantle layer. The spinal cord differentiation is completed at the age 7 day’s incubation, its, were we notice that the central canal is clear and cavity lined with neurons and we note the arrangement of gray matter in the form of the letter H and its inside and it is characterized by dorsal and ventral horns and the gray matter substance and note the formation of dorsal medium spetum and ventral medium fissure.
In the field of implantology, peri-implantitis is still a common complication of implant failure. Similar to periodontal disease, this kind of pathological condition is characterized by inflammation of the tissues surrounding dental implants or fillings. The sources of infection have been shown to be chronic periodontitis and poor maintenance of the communion. A thorough examination of the intricate components of peri-implantitis was sought in this review in order to identify common characteristics of the disease with regard to bacteria, biofilm formation, host immunological responses, diagnostic tools, and therapeutic treatments. The aim of this study was to provide a detailed overview of the different bacterial species associated
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreBackground : Double diabetes (DD) is the term used to describe situations in which a patient exhibits characteristics that are a combination of type 1 diabetes mellitus(T1DM) and type 2 Diabetes Mellitus (T2DM) a large epidemiological study found that 25.5% of people with T1D also had the metabolic syndrome. A new protein hormone called asprosin is predominantly released by white adipose tissue. It was initially discovered in 2016 . Asprosin is important diagnoses marker for insulin resistant in diabetes patients ,additionally is very important denotation about early diagnoses of type 2 diabetes. Objectives: The current study aims to find predictive significance of diagnosis a double diabetes by evaluating the asprosin in the blood serum of
... Show MoreViscosity (η) of solutions of 1-butanol, sec-butanol, isobutanol and tert-butanol were investigated in aqueous solution structures of ranged composition from 0.55 to 1 mol.dm-3 at 298.15 K. The data of (η/η˳) were evaluated based on reduced Jone - Dole equation; η/η˳ =BC+1. In the term of B value, the consequences based on solute-solvent interaction in aqueous solutions of alcohols were deliberated. The outcomes of this paper discloses that alcohols act as structure producers in the water. Additionally, it has shown that solute-solvent with interacting activity of identical magnitude is in water-alcohol system
This study is at the heart of the pragmatic theory, as this research seeks to highlight the concept of necessity, and what the researchers have tended to do is that the development that has acquired integrated pragmatics is only for the development of the subject of necessity, as it is one of the contents of the saying, and this is what made Decroux define it as the semantic element that Concerning the saying, as for Grace; He paid great attention to the conversational imperative, and understood the requirement by clues or suggestions, as it is an element known for its absence and presence in the linguistic structures included in the text when reading or when understanding. This study has paved the way for clarifying the concept of necessi
... Show MoreThis study aims to deeply analyze the character of serial killers in Thomas Harris’ novels and focuses on his novel Red Dragon. The Study searches in these complex and deep characters through the use of Erich Fromm's concepts about the destructive nature of the human psyche and what are the factors affecting serial killers in all social psychological, and biological aspects. This study Concluded: Thomas Harris portrayed the characters of serial killers in a professional and complex and made the reader go on a contemplative journey in the mind and soul of the serial killer, thus reaching the climax of artistic perfection.
In this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.