Preferred Language
Articles
/
jcofarts-518
Forbidden Montage and the transition Technique in one-snapshot Movies 1917 Film- A model: محمد عبد الجبار كاظم-عذراء محمد حسن
...Show More Authors

  Starting from the term (forbidden montage) initiated by the French critic (Andre Bazin) as a method of processing the movies that depend on (mise en scene) achieved by the action of the camera and its ability to photograph and employ the depth of the field, in addition to the possibility of free movement without interruption in the filming environment in order to avoid montage as much as possible (the montage that distorts focus and distracts attention and moves away from realism, which is the most important theoretical pillar of Bazin in photography). The pursuit was behind a cinema that depicts its topics in one integrated snapshot with all its details thus approximating reality without any interference of montage. Our study started from this concept, which addressed processing the subjects of the achieved films without montage or clipping which divides the film, which are called the continuous one-shot films, among these films is the war film (1917) which was produced in the same year that the coronavirus pandemic sparked in 2019.
Our study started to diagnose the method of processing the stories of the feature films in one continuous shot without montage, though those films were composed of a set of snapshots, yet a certain technique literally and not figuratively connected these long take shots to each other to give the impression and attract the attention to the fact that the film is composed of one continuous shot. This technique revolved around certain patterns of mechanisms and techniques that facilitated the process of composing the footage in the form of (invisible cutting) which gives the film construction the concept of (the one-shot film).
The study came up with some results including determining the technique adopted in the transition which helps the feeling that the film looks as one-shot and classified the method of this technique into (deception or intrigue, cunning, concealing the transition under the mask, the quick camera movement, the visual effects of all types, and the technique of darkness and entanglement).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 27 2024
Journal Name
Mathematical Modelling Of Engineering Problems
Dynamics of a Fractional-Order Prey-Predator Model with Fear Effect and Harvesting
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 27 2024
Journal Name
Malaysian Journal Of Mathematical Sciences
Dynamics of a Social Model for Marriage and Divorce Relationship with Fear Effect
...Show More Authors

The objective of this article is to delve into the intricate dynamics of marriage relationships, exploring the impact of emotions such as fear, love, financial considerations and likability. In our investigation, we adopt a perspective that acknowledges the nonlinear nature of interactions among individuals. Diverging from certain prior studies, we propose that the fear element within the context of marriage is not a singular, isolated factor but rather a manifestation resulting from the amalgamation of numerous social issues. This, in turn, contributes to the emergence of strained and unsuccessful relationships. Unlike conventional approaches, we extensively examine the conditions essential for the existence of all socially signifi

... Show More
View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Lecture Notes In Networks And Systems
Advanced Security Technique in Presence of Open Communication System and Cyber Era
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Southwest Jiaotong University
The Dynamics of an Eco-Epidemiological Model with Allee Effect and Harvesting in the Predator
...Show More Authors

The aim of this study was to propose and evaluate an eco-epidemiological model with Allee effect and nonlinear harvesting in predators. It was assumed that there is an SI-type of disease in prey, and only portion of the prey would be attacked by the predator due to the fleeing of the remainder of the prey to a safe area. It was also assumed that the predator consumed the prey according to modified Holling type-II functional response. All possible equilibrium points were determined, and the local and global stabilities were investigated. The possibility of occurrence of local bifurcation was also studied. Numerical simulation was used to further evaluate the global dynamics and the effects of varying parameters on the asymptotic behavior of

... Show More
Crossref
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Proposing Robust IRWs Technique to Estimate Segmented Regression Model for the Bed load Transport of Tigris River with Change Point of Water Discharge Amount at Baghdad City
...Show More Authors

Segmented regression consists of several sections separated by different points of membership, showing the heterogeneity arising from the process of separating the segments within the research sample. This research is concerned with estimating the location of the change point between segments and estimating model parameters, and proposing a robust estimation method and compare it with some other methods that used in the segmented regression. One of the traditional methods (Muggeo method) has been used to find the maximum likelihood estimator in an iterative approach for the model and the change point as well. Moreover, a robust estimation method (IRW method) has used which depends on the use of the robust M-estimator technique in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 28 2021
Journal Name
Journal Of The College Of Education For Women
An Estimated Answer of a Condition between the Interpretive Structure and Surface Structure: Al-Qurtubi’s Tafseer as a Model: عمر عقلة خليف الدعجة
...Show More Authors

This present work is concerned with one of the syntactic issues that has been researched by many linguists, grammarians, and specialists in Islamic studies, the estimated answer to a condition. However, this topic is researched this time by examining Imam Al-Qurtbi’s opinions in interpreting related ayas from the holly Quraan in his book (Collector of Quranic Rules) or its transliteration (Al-Jami’ Li Ahkam Al-Quran). Such a step involves commenting on, tracking what Al-Qurtbi said in this regard, discussing it from the points of view of other grammarians, and judging  it accordingly, taking into account the apparent surface structures of the examples collected. To achieve this objective, the inductive analytical approach has be

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
The cultural dimension in Turkey's foreign policy towards the South Caucasus (Model Azerbaijan)
...Show More Authors

Preserving the independence and sovereignty of the countries of the South Caucasus region, establishing political and economic stability in the region, and supporting regional cooperation are the main elements of Turkish foreign policy towards the region. The South Caucasus region, which has historical and cultural ties between it and Turkey, is a bridge that links Turkey to Central Asia.                     

     Turkey later developed advanced relations with Azerbaijan and Georgia. However, the same momentum was not achieved in terms of relations with Armenia because of the conflict over Nagorny Karabakh

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 21 2013
Journal Name
المؤتمر العلمي الدولي الرابع لاتحاد الاحصائيين العرب / بغداد
Estimating Fertility Rates in Iraq by using (Lee-Carter) Model And Forecasting for the Period (2012_2031)
...Show More Authors

A large number of researchers had attempted to identify the pattern of the functional relationship between fertility from a side and economic and social characteristics of the population from another, with the strength of effect of each. So, this research aims to monitor and analyze changes in the level of fertility temporally and spatially in recent decades, in addition to estimating fertility levels in Iraq for the period (1977-2011) and then make forecasting to the level of fertility in Iraq at the national level (except for the Kurdistan region), and for the period of (2012-2031). To achieve this goal has been the use of the Lee-Carter model to estimate fertility rates and predictable as well. As this is the form often has been familiar

... Show More
Preview PDF