The topic of the research tagged (narrative structure and its impact on building open and closed endings in the fictional film) is summarized by studying the mechanism of employing closed and open endings in the fictional film. novelist, then the need for it, as well as the objectives of the research and clarifying its limits as well as its importance. Then moving to the theoretical framework, which included three topics, where the first topic was entitled (the cinematic construction of the film narrative), either the second topic (the structure of complexity and narrative solutions), or the third topic dealt with the subject (the structure of the end and its relationship to the construction of the narrative). After completing the theoretical aspect, the research concluded with a number of indicators of the theoretical framework that were adopted as a tool for analyzing the sample by analyzing the sample within the text of the theoretical framework, which is the movie (Legends of Autumn) directed by Edward Zwick, and the movie (The Legend of 1900) directed by Giuseppe Tornatori to come out With results and then conclusions and recommendations, then came the list of sources and footnotes in English.
Background: While two-thirds of breast cancers express hormone receptors for either estrogen (ER) and/or progesterone (PR) , genetically altered PI3K pathway was found in more than 70% of ER-positive breast cancers.An aberrant activity of cyclin-dependent kinase 1 (CDK1) in a wide variety of human cancers has selectively constituted an attractive pharmacological targets in MYC-dependent human breast cancer cells.
Aim of the study: Role of p110-beta as well as and CDK 1 in the pathogenesis of subset of breast cancers and contribution in their carcinogenesis.
Type of the study: is a retrospective study
Methods: This retr
... Show MoreThe research aimed to statement, which impact that the development of Iraqi auditing standards in the fight against corruption and to fulfill the reform requirements by conducting a comparative study analysis with a framework proposal to amend the Iraqi Audit directory number statement (6) issued by the Accounting and Auditing Standards Board of the Republic of Iraq dated 08/24/2002 on audit planning and supervision on the basis of the latest versions of international auditing standards in this regard.
The researchers concluded that there is a need to update the standards (evidence) audit accredited in the Republic of Iraq in accordance with international auditing standards to meet the requirements of the report of the external a
... Show MoreCertainly there is a negative impact on development due to corruption in its corruption forms It is administrative and financial as well as direct impact on all sectors Including the health sector, which has seen in Iraq a marked setback in performance and services , The research aims at the possibility of demonstrating the negative effects of financial and administrative corruption on health institutions and Inability to meet health needs The extent to which Regulatory institutions and institutions manage to reduce financial and administrative corruption and ways of dealing with it The phenomenon of financial and administrative corruption is the most serious phenomenon because of its impact on economic growth, which in turn impedes the
... Show MoreIn this note we consider a generalization of the notion of extending modules namely supplement extending modules. And study the relation between extending and supplement extending modules. And some properties of supplement extending. And we proved the direct summand of supplement extending module is supplement extending, and the converse is true when the module is distributive. Also we study when the direct sum of supplement extending modules is supplement extending.
Background: With the increasing demands for adult orthodontics, a growing need arises to bond attachments to porcelain surfaces. Optimal adhesion to porcelain surface should allow orthodontic treatment without bond failure but not jeopardize porcelain integrity after debonding.The present study was carried out to compare the shear bond strength of metal bracket bonded to porcelain surface prepared by two mechanical treatments and by using different etching systems (Hydrofluoric acid 9% and acidulated phosphate fluoride 1.23%). Materials and Methods: The samples were comprised of 60 models (28mm *15mm*28mm) of metal fused to porcelain (feldspathic porcelain). They were divided as the following: group I (control): the porcelain surface left u
... Show MoreThroughout this paper we introduce the concept of quasi closed submodules which is weaker than the concept of closed submodules. By using this concept we define the class of fully extending modules, where an R-module M is called fully extending if every quasi closed submodule of M is a direct summand.This class of modules is stronger than the class of extending modules. Many results about this concept are given, also many relationships with other related concepts are introduced.
This paper aims to introduce the concepts of -closed, -coclosed, and -extending modules as generalizations of the closed, coclossed, and extending modules, respectively. We will prove some properties as when the image of the e*-closed submodule is also e*-closed and when the submodule of the e*-extending module is e*-extending. Under isomorphism, the e*-extending modules are closed. We will study the quotient of e*-closed and e*-extending, the direct sum of e*-closed, and the direct sum of e*-extending.
One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show More