Preferred Language
Articles
/
jcofarts-1062
fashion and Contrasting in the contemporary Iraqi theater show
...Show More Authors

Since its inception, the theatrical performance has been based on the principle of permanence, continuity, renewal and innovation in the structure of its visual elements. These innovations and the effectiveness of continuity cannot be achieved without searching for everything that is new and different at the level (form and content) in order to create an image with innovative and effective features in the theatrical discourse, and from Among the elements of the theatrical performance (theatrical costumes) that have been subject to variation since the beginning of the theater until now, and for this purpose, the current research was conducted with the question of the research problem: What are the variations of costumes in the contemporary Iraqi theatrical performance.
And (theoretical framework) the first topic: the concept of contrast in theatrical performance, the second topic: the different vision of theatrical currents, the third topic: the differentiation of costumes in form and content, and indicators of the theoretical framework.
The (research procedures) came from the research community and the research method: descriptive analytical or research sample (presentation of a play of revelations). The results came as conclusions, recommendations and suggestions, and the most important results are:
1- The events in different costumes are subject to the requirements of the idea of the play and its events, and this is what we find evident in all the costumes of theatrical characters (disclosures) in the characters (Al-Hajjaj, Aisha, and the servant).
2- Contrasting with costumes does not mean distortion and lack of clarity in their forms, but rather follow steps in design with scientific and applied dimensions that produce a different costume that is comprehensible and understandable. The search concluded with a list of sources

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 20 2024
Journal Name
Iraqi Journal Of Pharmaceutical Sciences
Impact of Clinical Pharmacist-Led Interventions on Short Term Quality of Life among Breast Cancer Women Taking Chemotherapy
...Show More Authors

Abstract: Background: Drug toxicity and chemotherapeutic side effects negatively impact the quality of life of breast cancer patients. Objectives: to evaluate the efficacy of pharmaceutical Interventions (PI) on quality of life (QOL)Among chemotherapy intake breast cancer women.  Method: A pre-post interventional study was carried out at the chemotherapy ward of Alhabobi Hospital in Alnasiriyah City. Eligible patients received comprehensive pharmaceutical care and a self-compiled Breast Cancer Patients Medication Knowledge Guide pamphlet. Each patient received two sessions, the first at baseline and the second after 7, 14, or 21 days depending on the next taking dose of chemotherapy. Each session lasted for approximately 15-30 minutes. Par

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Apr 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On SAH – Ideal of BH – Algebra
...Show More Authors

     The aim of this investigation is to present the idea of  SAH – ideal , closed SAH – ideal and closed SAH – ideal with respect to an element ,  and s-  of BH – algebra .

We detail and show  theorems which regulate the relationship between these ideas and provide some examples in BH – algebra .

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
Numerical Study for HAWT Wake shape with different Angles of Attack
...Show More Authors

Increasing world demand for renewable energy resources as wind energy was one of the goals behind research optimization of energy production from wind farms. Wake is one of the important phenomena in this field. This paper focuses on understanding the effect of angle of attack (α) on wake characteristics behind single horizontal axis wind turbines (HAWT). This was done by design three rotors different from each other in value of α used in the rotor design process. Values of α were (4.8˚,9.5˚,19˚). The numerical simulations were conducted using Ansys Workbench 19- Fluent code; the used turbulence model was (k-ω SST). The results showed that best value for extracted wind energy was at α=19˚, spread distance of wak

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 04 2023
Journal Name
Baghdad Science Journal
Generalised Henstock - Kurzweil Integral with Multiple Point
...Show More Authors

This paper deals with a new Henstock-Kurzweil integral in Banach Space with Bilinear triple n-tuple and integrator function Ψ which depends on multiple points in partition. Finally, exhibit standard results of Generalized Henstock - Kurzweil integral in the theory of integration.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Content Based Image Retrieval (CBIR) by Statistical Methods
...Show More Authors

            An image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T-

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Iraqi Journal Of Science
Analysis of Hierarchical Routing Models
...Show More Authors

In this study, flow-based routing model is investigated. The aim of this study is to increase scalability of flow control, routing and network resources solutions, as well as to improve Quality of Service and performance of the whole system. A method of hierarchical routing is proposed. The goal coordination method alsoused in this paper. Two routing models (model with quadratic objective function and model with traffic engineering) were fully analyzed. The basic functions of the hierarchical routing model levels based on goal coordination method were addressed Both models’ convergence is also explained. The dependence of the coordination iterations number on the packet flow rates for both models is graphically shown. The results shows

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fuzzy Soc-Semi-Prime Sub-Modules
...Show More Authors

     In this paper, we study a new concept of fuzzy sub-module, called  fuzzy socle semi-prime sub-module that is a generalization the concept of semi-prime fuzzy sub-module and fuzzy of approximately semi-prime sub-module in the ordinary sense.  This leads us to introduce level property which studies the relation between the ordinary and fuzzy sense of approximately semi-prime sub-module. Also, some of its characteristics and notions such as the intersection, image and external direct sum of fuzzy socle semi-prime sub-modules are introduced. Furthermore, the relation between the fuzzy socle semi-prime sub-module and other types of fuzzy sub-module presented.

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Agricultural And Statistical Sciences
A COMPARISON BETWEEN SOME HIERARCHICAL CLUSTERING TECHNIQUES
...Show More Authors

In this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.

Preview PDF
Scopus (1)
Scopus
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Network Performance Analysis Based on Network Simulator NS-2.
...Show More Authors

     NS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.

View Publication Preview PDF
Crossref