End of the twentieth century witnessed by the technological evolution Convergences between the visual arts aesthetic value and objective representation of the image in the composition of the design of the fabric of new insights and unconventional potential in atypical employment. It is through access to the designs of modern fabrics that address the employment picture footage included several scenes footage from the film, which focuses on research and analytical as a study to demonstrate the elements of the picture and the organization of its rules and how to functioning in the design of fabrics, Thus, it has identified the problem by asking the following: What are the elements of the picture footage and how the functioning of the structural components in the design of fabrics? The aim of the research was "revealed the structural components of the image footage and its role in shaping the design of specific fabrics and functionally." Within the limits of research in the contracts quoted include images from the movie scenes for US films produced 1950_ 1960 and its role in the formation design custom fabrics and functional home furnishings and upholstery and of Turkish origin, produced in 2014. The second chapter the theoretical framework, the first section: the elements of the picture _ the concept, and the second topic: the image technology in the configuration design of the fabric, and the third section: Image and founded the structural design, to describe and analyze models of design fabrics, and reach research into the most important and follows the results:1. directed the picture footage into a coherent sequence to build content start the idea and the continuation of the event and ending scenes, while constructivism content associated with the design fabrics to the content of the idea are fitted regular format based on the formal vocabulary to achieve aesthetic and functional values such as the fabrics for use household upholstery placemats.2. emphasis on influencing shots in movies and choose as Marlin Monroe known figures who were at the center of a fundamental intellectual content and content in frequency came in my intention.3. confirms the correlation between The display mechanism of the image in the artistic film production and design and formulated according to data structural shape, color and values, lighting, movement and performance of the characters, which confirms the vision of producing the film depending on his time and events
The aim of the research was to prepare Pilates exercises using the barrel ladder apparatus and to identify the effect of Pilates exercises on agility, coordination, and motor sequences of third-year female students in artistic gymnastics. The researcher adopted the experimental method to achieve the objectives of the study and to verify its hypotheses, as it is suitable for the nature and problem of the research. In selecting the research population, the researcher carefully chose the sample using a purposive method, clarifying its elements and constituent units. The research population consisted of third-year female students at the College of Physical Education and Sports Sciences for Women / University of Baghdad, with a total of 20 stud
... Show MoreErratum for Organic acid concentration thresholds for ageing of carbonate minerals: Implications for CO2 trapping/storage.
It highlights the importance of research through its focus on the assessment of tax for settling accounts Mmakhr medicines and annual statement controls and its role in determining the taxable income of the real tax Mmakhr drugs and achieve tax equity through tax settling accounts. The tax authority relies annual controls laid down by the tax settling accounts for Mmakhr medicines despite their inclusion bookkeeping business No. 2 system for the year 1985 average .ually this basis formulated hypothesis (that the adoption of the tax authority on annual controls in the tax settling accounts for Mmakhr medicine does not contribute in determining income taxable real tax for this Almmakr). the resulting search for a number of conclusions and
... Show MoreDespite Iraq's possession of the energies material, human and agricultural resources and great economic but that contribution of the agricultural sector in the total gross fixed capital formation and gross domestic product in the Iraqi economy remained low and declining continuously since the nineties of the last century, as well as the inability of agricultural production to meet the country's needs of food . The food gap increased strategic food crops until it reached 1049 thousand tons in 2010. On this basis, there is a need to study and analysis the behavior of the function of gross fixed capital format
... Show MoreThe Necessity of College of Education for Woman from the Point of view of Students
The study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups: a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess
... Show MoreAR Al-Heany BSc, PKESMD MSc., PSAANBS PhD, APAANMD MSc., DDV, FICMS., IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2014 - Cited by 14
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show More