
The space constitutes a cornerstone of the creativity process since the emergence of arts and literature. Gaston Bachelard has a significant role in highlighting the importance of the place in his book entitled (Poetics of Space). Since then, the space, especially in the TV drama, is no longer a mere background indicating the location or the date of the event. Space inside these series has become an inseparable part of the artistic or dramatic fabric, that the visual scene started to formulate alongside the movement of the individuals in their language or accents that are specified inside the space as an incubator for the décor, clothes, makeup, accessories and lights in addition to the sound and musical effects. The lens angles
... Show MoreObjective: The aim of this study is to determine the factors affecting birth space interval in a sample of women.
Methodology: A cross-sectional study conducted in primary health centers in Al-Tahade and Al- Shak Omar in
Baghdad city. Data were collected by direct interview using questionnaire especially prepared for the study.
Sample size was (415) women in age group (20-40) years who were chosen randomly.
Results: Analysis of data shows highest rate of women (31.8%) had a birth space interval of (8-12) months
followed by (26.7%) had a birth space interval of (19-24) months, (20.2%) had a birth space interval of (>24)
months and (16.1%) had a birth space interval of (13-18) months respectively, while lower rate of w
This study aims at examining and confirming the patterns of phenetic relationships and the levels of variations within and among the species of Lotus L., 1753 in Egypt by using morphometric analysis techniques. We have evaluated 24 morphological characters from about 300 herbarium specimens representing 19 species of Lotus that are currently recognized. Based on numerical analyses of macromorphological characters (cluster analysis, principal coordinate analysis and principal component analysis), 19 species of Lotus were recognized from Egypt. These species were clustered in six species-specific groups: (I) Lotus halophilus Boiss. & Spruner, L. angustissimus L., L. glinoides Delile and L. schimperi Steud. ex Boiss., (II) Lotus glaber
... Show MoreThe cinematic story depends on many construction techniques that together constitute the story features technically and the secondary events are considered one of these basic techniques that are directly affected by the employment mechanisms inside the cinematic achievement. This subject initiated the two researchers to decide the title of the research: (Mechanisms of Employing Secondary Event in Cinematographic Discourse). The research is divided into an introduction that included the problem details, the aim and defining the terms used. The first section was the act and the event in the cinematic story, which addressed the relation between the act and the event and the nature of the simulation that tries to ascend the human act
... Show MoreThis research presents a method of using MATLAB in analyzing a nonhomogeneous soil (Gibson-type) by
estimating the displacements and stresses under the strip footing during applied incremental loading
sequences. This paper presents a two-dimensional finite element method. In this method, the soil is divided into a number of triangle elements. A model soil (Gibson-type) with linearly increasing modulus of elasticity with depth is presented. The influences of modulus of elasticity, incremental loading, width of footing, and depth of footing are considered in this paper. The results are compared with authors' conclusions of previous studies.
KE Sharquie, AA Noaimi, AG Al-Ghazzi, Journal of Dermatology & Dermatologic Surgery, 2015 - Cited by 19
It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.