The personal drama in particular, and one of the key elements underlying the dramatic structure to convey ideas and visions presented by the author when writing the text of the dramatic fall after that on the way out the submission form that suits the proposals of the text and processors directorial would push the wheel of dramatic structure to the front. So take the maker of the artwork (writer) undertook the transfer of those events and personalities in art presumed sometimes real and sometimes, in order to enrich the art inspired by the human reality through the ages, and full of its themes and ideas that led to the development experiences of peoples experiences of living. Therefore, we find it important to research in the characters dramatic, especially virtual ones, which is built-maker artwork artistic style, reflects the capacity of the writer's imagination and fertility of his ideas and what posed the impact in the hearts of the recipients, as a carrier of ideas and point of view of its maker, was full of movies many of the writers and authors who took the building and virtual personalities that do not resemble human beings, most notably the director (James Cameron), who is one of the industry pioneers and creators of virtual characters in the movie film, so we decided to stand on a cinematic experience in the film (Avatar). The Department of the researcher in this study, five chapters on the topic. Came the first chapter entitled systematic framework and included a research problem represented by the following question: What are the modalities used in character building in a virtual mock imagined by director James Cameron in the film (Avatar) model? The first chapter also included the importance of research and goals of the disclosure of modes that are built by default in the Personal Image imagined by director James Cameron in the film (Avatar). The second chapter has included a theoretical framework; the theoretical framework has been divided into three sections. First section: personal and personal default, were interested in studying personal drama and personal drama default, construction and do, and orientations and motivations. The second Section: Image and imaginary character building. Were interested in studying imagined the picture of the author and writer and director and the role of imagination in the character building. The third chapter dealt with the researcher measures that have been adopted in the analysis of the sample did not (Avatar) for the purpose of reaching a goal of the research. This included the chapter on research methodology and sample selection, and justification for the search tool. The fourth chapter has included an analysis of the selected Sample intentionality and extracts the desired results of the analysis. As he was the most prominent of the process of transformation in personal default of the hero came as a reaction against the attitudes of society, the real, and the adoption of these characters and the different ways to express her ideas (such as commentary on the event) technique in building a personal narrative. The researcher came out of the conclusions derived from the results of the analysis and the research contained some recommendations and suggestions that the researcher deems necessary for further studies included a list of research sources and summary of the research in English
Objective: The aim of the study is to assess the personal hygiene of adult patients with
diabetic foot.
Methodology: ٨ descriptive study was carried out in Baghdad teaching hospital, Al-Karama teaching hospital
and Al-Kindey teaching hospital for the period of 10/1/2006 to 1/9/2006. A purposive "non probability" sample
of (100) patient.
Questionnaire was constructed for achieving the purpose of the study. Data were collected through the
application of the questionnaire and interview technique. Data were analyzed through descriptive statistical
approach (frequency & percentage) and inferential statistical approach (chi-square ع correlation) by using of
SPSS.
Results: The study results indicated that the ra
This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ
... Show MoreAbstract
The research aims to determine the nature of the Iraqi market in terms of banking financial stability and the extent impact of the operational efficiency on it, Accordingly, chosen 15 relational banks were chosen as an intentional sample that could represent the Iraqi banking system for the period 2010-2020. The operational efficiency variable was measured according to the data envelope model, and banking financial stability used CAMELS model which includes five indicators (capital adequacy, asset quality, management quality, profitability, and liquidity), so for testing the research hypotheses used the random regression model by adopting the S
... Show MoreThis paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a third order linear time
... Show MoreThis paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a thir
... Show MoreThis study aims to measure and analyze the direct and indirect effects of the financial variables, namely (public spending, public revenues, internal debt, and external debt), on the non-oil productive sectors with and without bank credit as an intermediate variable, using quarterly data for the period (2004Q1–2021Q4), converted using Eviews 12. To measure the objective of the study, the path analysis method was used using IBM SPSS-AMOS. The study concluded that the direct and indirect effects of financial variables have a weak role in directing bank credit towards the productive sectors in Iraq, which amounted to (0.18), as a result of market risks or unstable expectations in the economy. In addition to the weak credit ratings of borr
... Show MoreThis paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.
The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).
