It boils down search is marked by (employing technology in the establishment of globalization in the Film Art), and walk parallel plan between the technical and artistic movements and the impact of globalization on the final performed in the film Film of innovations and technology and rapid capital that provided the filmmakers and Kartalatha which focused entirely in the embodiment of the idea and published in the service around the world. And distributes research on four chapters first chapter dealt with the methodological framework of the research, which included research problem marked by the following question: (What are the modalities to employ technology in the establishment of globalization in the Film Art?) And the importance of research and its objectives and the limits of research and definition of key terms that came in the search. The second chapter, a theoretical framework and previous studies. And distributes the theoretical framework of the three sections, taking the first section includes a technical impact on the cinematic art, the extrapolation of the historic march of the evolution of technology (picture elements) in the audio-visual scope of supply and development techniques. And taking second section the concept of globalization and its relationship with technology in the film Alcinmaia.oma third section junk technology and its role in the delivery of the American film to the role of global supply in the establishment of globalization, the role of these technologies in the embodiment of contents and ideas presented in the text through her portrayal of movies to these processors and different levels. In the third chapter, which has been allocated to research procedures, which included research methodology, and appointed intentionality included not: (c Matrix 1 The Matrix). As well as research and analysis unit and its tool and analysis steps society then, Neshat sample analysis. Then the fourth quarter, Neshat sample analysis. The fifth chapter Vahtoy results. As well as the conclusions reached by the researcher. It must Research of this type that contains the sources supports the scientific research process
Air stripping for removal of Trichloroethylene (TCE), Chloroform (CF) and Dichloromethane (DCM) from water were studied in a bubble column (0.073 m inside dia. and 1.08 m height with several sampling ports). The contaminated water was prepared from deionized water and VOCs. The presence of VOCs in feed solution was single, binary or ternary components. They were diluted to the concentrations ranged between 50 mg/l to 250 mg/l. The experiments were carried out in batch experiments which regard the bubble column as stirred tank and only gas was bubbled through stationary liquid. In this case transient measurements of VOC concentration in the liquid phase and the measured concentra
... Show MoreThis study aimed to investigate the feasibility of treatment actual potato chips processing wastewater in a continuously operated dual chambers microbial fuel cell (MFC) inoculated with anaerobic sludge. The results demonstrated significant removal of COD and suspended solids of more than 99% associated with relatively high generation of current and power densities of 612.5 mW/m3 and 1750 mA/m3, respectively at 100 Ω external resistance.
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreAssessment of Salivary Macrophage Inflammatory Protein-1 Alpha Level in Different Stages of Periodontitis, Riyam Muthanna Muhammed*, Hadeel Mazin Akram
Objective Neutrophils own an arsenal of dischargeable chemicals that enable them to handle bacterial challenges, manipulating innate immune response and actual participation in acquired immunity. The reactive oxygen species (ROS) are one of the most important chemicals that neutrophils discharge to eradicate pathogens. Despite their beneficial role, the ROS were strongly correlated to periodontal tissue destruction. Lowdensity neutrophils (LDN) have been recognized for producing enhanced quantities of ROS. However, the potential role of ROS produced by LDN in periodontitis is unknown. The aim of the study was to investigate the impact of ROS produced by LDN in periodontal diseases.
|
Background: Drawing blood to measure total serum bilirubin is painful & time consuming. Transcutaneous bilirubinometer working by multiwavelength spectral reflectance from the skin surface on forehead or upper sternum is a quick & painless technique. Objectives: to compare the effectiveness of transcutaneous (over the upper sternum and forehead) and serum bilirubin measurement of neonate with jaundice. Subjects and Methods: This is a cross sectional prospective study. It enrolled 175 jaundiced neonates & excluded those exposed to phototherapy. It was conducted at Child Central Teaching Hospi |
The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show More