The topic of the research tagged (narrative structure and its impact on building open and closed endings in the fictional film) is summarized by studying the mechanism of employing closed and open endings in the fictional film. novelist, then the need for it, as well as the objectives of the research and clarifying its limits as well as its importance. Then moving to the theoretical framework, which included three topics, where the first topic was entitled (the cinematic construction of the film narrative), either the second topic (the structure of complexity and narrative solutions), or the third topic dealt with the subject (the structure of the end and its relationship to the construction of the narrative). After completing the theoretical aspect, the research concluded with a number of indicators of the theoretical framework that were adopted as a tool for analyzing the sample by analyzing the sample within the text of the theoretical framework, which is the movie (Legends of Autumn) directed by Edward Zwick, and the movie (The Legend of 1900) directed by Giuseppe Tornatori to come out With results and then conclusions and recommendations, then came the list of sources and footnotes in English.
The research aimed to study the financial markets liquidity and returns of common stocks , Take the research the theoretical concepts associated with each of the liquidity of financial markets and returns of common stocks , As well as the use of mathematical methods in the practical side to measure market liquidity and Stocks Return, the community of research in listed companies in Iraqi stock exchange that have been trading on its stock and number 85 joint-stock company, The research was based to one premise, there is a statistically significant effect for the liquidity of the Iraqi stock exchange on returns of common stocks to traded companies in which , Using th
... Show MoreThis Action research aimed at Assisting Students of Faculty of Educational Sciences at Al-Quds Open University to design computerized lessons using the Power Point software and according to ADDIE model. The study sample consisted of 40 students who were taking a course titled Technology of Education during the second semester of the 2014-2015 academic year and three academic instructors . To collect the required date , the researchers used focus group technique and structured interviews to get information from the 40 students and the three academic instructors involved in the course Technology of Education in QOU /Nablus Branch. In addition to these methods, a workshop with a guiding checklist was employed t
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreThis paper presents a numerical simulation of the flow around elliptic groynes by using CFD software. The flow was simulated in a flume with 4m long, 0.4m wide, and 0.175m high with a constant bed slope. Moreover, the first Groyne placed at 1m from the flow inlet with a constant the Groyne height of 10cm and a 1cm thickness, and the width of Groynes equals 7cm. A submergence ratio of the elliptic Groynes of 75% was assumed, corresponding to a discharge of 0.0057m3/sec. The CFD model showed a good ability to simulate the flow around Groynes with good accuracy. The results of CFD software showed that when using double elliptic Groy
... Show MorePurpose: The research aims to explore the impact Business Intelligence System (BIS) and Knowledge Conversion Processes (KCP) in the Building Learning Organization (LO) in KOREK Telecom Company in Baghdad city.
Design/methodology/approach: in order to achieve the objectives of the research has been the development of a questionnaire prepared for this purpose and then has tested the search in the telecommunications sector, representatives of one of the telecommunications companies in Baghdad city, has therefore chosen KOREK Telecom company as a sample for research, and the choice was based on the best standard international companies to serve mobile communications in terms o
... Show MoreBreak in the bond and its impact on the difference of scholars
This research test the relationship and the effect of an explanatory variable transparency in the organizational reputation responder variable by senior management in the departments of the Ministry of Housing and Construction centrally funded, As well as come out among other recommendations contribute to the achievement of organizational reputation of the organizations surveyed. Given the importance of the research topic for the public sector and the community and the environment in which they operate researcher designed questionnaire containing (30) items, and collected data from (92) respondents, representing the research community (eight establishments) exclusively and comprehensively, relying descriptive analytic
... Show MoreSince the advent of the sunrise of the immortal message, Islamic legislation has always established justice and the right guidance, and has prevented any perversion, injustice or corruption, with a divine system that called in its course the characteristics of the legislation on its general basis and its ability to develop, progressivity, and paving the way with a collective approach, accompanied by the worldly and moral punishment. When the corrupters went too far, reformers were delayed and values were missed; Mankind has been afflicted with the scourge of injustice and loss, and has lost sight of the approach that the Creator of the world has given to the people of the world, for what would guide them in their affairs sooner and later
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThe current study investigates the impact of virtual reality technology on industrial product design. The focus of this study is on the development of industrial products that utilize virtual reality technology, specifically examining the effects of this technology on the visual and design aspects of these products. The aim is to continuously improve the functionality of industrial products and enhance the user experience through virtual reality integration.
The first chapter of the study addresses the research problem, which centers around exploring the technological influence of virtual reality used in industrial products and understanding the functionalities it brings to the design process. Virtual reality technology facilitates th