Preferred Language
Articles
/
jcofarts-15
Employing lighting to express the cinematic personality duplication
...Show More Authors

Represents light a sovereign and importance in cinematography element of what possessed the physical characteristics make it a sharp image detail or opaque, or any other form as he wants the director, Valdu away from the main function, which emerged with the beginnings of cinema, any access to endanger the proper and good, the Alachtgalat dramatic and psychological are deepened performance lighting and functioned in adjacent with the shadows, all the two complement each other, which affects the image details or even the ability to express their personal depths or the social and psychological same place, and this prompted the researcher to determine the search in the following address: (employing lighting to express their personal duplicating film) the researcher has to divide his research, and contains the methodological framework on the research problem formulated The importance and goals aimed at detecting modes of employing lighting to express their personal cinematic duality, and the limits of research and determine the terms.
contains the theoretical framework and included a three Anoanat President are: First topic:  The lighting concept and engage .....The second topic: the personal in film The third topic: lighting and psychological reaction to the film character The researcher came to indicators of the theoretical framework relied upon as a tool for the analysis of the sample, and then dealt with previous studies that Ti_akl with the subject of his research research measures have contained the research methodology chosen by the researcher to suitability nature of research is descriptive method that involves the analysis, and then the sample that was selected Qsidia, and search tool, and the unit of analysis, and the sincerity of the tool. The fourth quarter included the sample analysis process. findings and conclusions he has reached a researcher to several findings and conclusions, including

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jul 23 2022
Journal Name
Arab World English Journal
Impoliteness Formulas, Triggers, and Purposes to Refusal as Employed by Iraqi English Learners
...Show More Authors

The present study aims at scrutinizing the impoliteness types, causes, and purposes utilized by Iraqi English language learners when refusing marriage proposals. Thus, it attempts to answer the questions: (1) what are the impoliteness formulas used by the Iraqi learners of English in refusing marriage proposals?, and (2) What are their impoliteness triggers/causes and the purposes? The study is significant in bridging the gap that few linguistic types of research concentrate on studying intentionality and emotions allied with impoliteness. Data were collected from 35 Iraqi learners of English responding to 6 situations of marriage. The data were analyzed using Culpeper’s (2011) formulas of impoliteness and Bousfield’s (2007) impolite

... Show More
View Publication
Crossref
Publication Date
Tue Jan 31 2017
Journal Name
Journal Of Engineering
Behavior of Reinforced Concrete Columns Subjected to Axial Load and Cyclic Lateral Load
...Show More Authors

Columns subjected to pure axial load rarely exist in practice. Reinforced concrete columns are usually subjected to combination of axial and lateral actions and  deformations, caused by  spatially‐complex loading patterns as during earthquakes causes lateral deflection that in turn affects the horizontal stiffness. In this study, a numerical model was developed in threedimensional nonlinear finite element and then validated against experimental results reported in the literatures,
to investigate the behavior of conventionally RC columns subjected to axial load and  . lateral reversal cyclic loading. To achieve this goal, numerical analysis was conducted by using finite element program ABAQUS/Explicit. The variables co

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Agricultural And Statistical Sciences
Response of broad bean growth and early yield to exposure periods of vernalization
...Show More Authors

Scopus (5)
Scopus
Publication Date
Mon Jun 01 2015
Journal Name
Ijiset - International Journal Of Innovative Science, Engineering & Technology
Spray – casting CuInSe2 nanoink onto Au and Mo coated substrates to fabricate photovoltaics
...Show More Authors

Photovoltaic devices (PVs) were fabricated by spray-coating an ink of copper indium diselenide CuInSeR 2 R(CIS) nanocrystals as the light-absorbing layer. Without high-temperature post-deposition annealing, PVs were made on glass substrates with power conversion efficiencies of up to 1.5% and 0.9%, for Au and Mo coated respectively, under AM 1.5 illumination. UV–Vis spectrophotometer in the wavelength range 350–1500 nm. X-ray diffraction (XRD) and energy dispersive spectroscopy (EDS) analysis it is evident that CuInSeR 2 R have the chalcopyrite structure as the major phase and no secondary phase with a preferred orientation along (112) direction and The atomic ratio of Cu : In : Se in the nanocrystals is nearly 1 : 1 : 2.

View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Effect of Subinhibitory concentration of Antibiotic on Bacterial Adherence to Orthopedic Prosthetic Device
...Show More Authors

The effect of subinhibitory concentration of Antibiotics on the Adherence of S.aureus (Coagulase Positive Staphylococci), and S.epidermidis (Coagulase negative Staphylococci) and Pseudomonas aeruginosa, Enterobacter cloacae, Citobacter freundi (Gram negative bacteria) was done and the results revealed that Rifampicin was the best antibiotic inhibiting Staphylococci adherence and Vancomycin has less effect on the adherence of Staphylococci, whereas Tetracyclin was the best antibiotic inhbiting Gram negative bacteria adherence and Amikacin has the lest less effect on inhibiting bacterial adherence.

View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Compare Linear Progamming With Other Methods to Finding Optimal Solution for Transportation Problem
...Show More Authors

The researcher studied transportation problem because it's great importance in the country's economy. This paper which ware studied several ways to find a solution closely to the optimization, has applied these methods to the practical reality by taking one oil derivatives which is benzene product, where the first purpose of this study is, how we can reduce the total costs of transportation for product of petrol from warehouses in the province of Baghdad, to some stations in the Karsh district and Rusafa in the same province. Secondly, how can we address the Domandes of each station by required quantity which is depending on absorptive capacity of the warehouses (quantities supply), And through r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
Reinforcement of Asphalt Concrete by Polyester Fibers to Improve Flexural Bending Fatigue Resistance
...Show More Authors

Reinforcing asphalt concrete with polyester fibers considered as an active remedy to alleviate the harmful impact of fatigue deterioration. This study covers the investigation of utilizing two shapes of fibers size, 6.35 mm by 3.00 mm and 12.70 mm by 3.00 mm with mutual concentrations equal to 0.25 %, 0.50 % and 0.75 % by weight of mixture. Composition of asphalt mixture consists of different optimum (40-50) asphalt cement content, 12.50 mm nominal aggregate maximum size with limestone dust as a filler. Following the traditional asphalt cement and aggregate tests, three essential test were carried out on mixtures, namely: Marshall test (105 cylindrical specimens), indirect tensile strength test (21 cylindrical specimens)

... Show More
View Publication
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
Computation of Critical Submergence Depth to Avoid Surface Vortices at Vertical Pumps Intakes
...Show More Authors

The pumping station became widely used in many fields. Free surface vortices at intakes of pumps are not favorable. It may cause noise, excessive vibration, damage to the pumping structure, reduction in efficiency and flow for hydro-turbines, etc. One of the important problems encountered during the pump intake design is the depth of submergence and other design parameters to avoid strong free-surface vortices formation. This study aims to compute the critical submergence depth with some geometrical and hydraulic limitations by using Computational Fluid Dynamic (CFD) package. The mathematical model was validated with a laboratory model that had been conducted. The model of three intake pipes was investigated under five d

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More