Preferred Language
Articles
/
jcofarts-518
Forbidden Montage and the transition Technique in one-snapshot Movies 1917 Film- A model: محمد عبد الجبار كاظم-عذراء محمد حسن
...Show More Authors

  Starting from the term (forbidden montage) initiated by the French critic (Andre Bazin) as a method of processing the movies that depend on (mise en scene) achieved by the action of the camera and its ability to photograph and employ the depth of the field, in addition to the possibility of free movement without interruption in the filming environment in order to avoid montage as much as possible (the montage that distorts focus and distracts attention and moves away from realism, which is the most important theoretical pillar of Bazin in photography). The pursuit was behind a cinema that depicts its topics in one integrated snapshot with all its details thus approximating reality without any interference of montage. Our study started from this concept, which addressed processing the subjects of the achieved films without montage or clipping which divides the film, which are called the continuous one-shot films, among these films is the war film (1917) which was produced in the same year that the coronavirus pandemic sparked in 2019.
Our study started to diagnose the method of processing the stories of the feature films in one continuous shot without montage, though those films were composed of a set of snapshots, yet a certain technique literally and not figuratively connected these long take shots to each other to give the impression and attract the attention to the fact that the film is composed of one continuous shot. This technique revolved around certain patterns of mechanisms and techniques that facilitated the process of composing the footage in the form of (invisible cutting) which gives the film construction the concept of (the one-shot film).
The study came up with some results including determining the technique adopted in the transition which helps the feeling that the film looks as one-shot and classified the method of this technique into (deception or intrigue, cunning, concealing the transition under the mask, the quick camera movement, the visual effects of all types, and the technique of darkness and entanglement).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Non-Isothermal Crystallization Kinetics Model of PBT/ MWCNTs Nanocomposites
...Show More Authors

The non-isothermal crystallization kinetics and crystalline properties of nanocomposites poly butyleneterephthalate, [PBT] /multiwalled-carbon nanotubes (MWCNTs) were tested by differential scanning calorimetry (DSC). PBT/(MWCNTs) nanocomposite was prepared by ultrasonicated of MWCNTs (0.5, 1, 2, 4 wt %) in dichloromethane (DCM) and after that the powdered PBT polymer was added to the MWCNTs solution. The non-isothermal crystallization results show that increasing the MWCNTs contents, decreased the melting temperature (Tm) of PBT/(MWCNTs) nanocomposite as compared with pure PBT, while resulting in improving the degree of crystallinity. These results indicated that a little amount of MWCNTs can be evident strong nucleating agent in PBT na

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Dynamics of Predator-prey Model under Fluctuation Rescue Effect
...Show More Authors

This paper presents a novel idea as it investigates the rescue effect of the prey with fluctuation effect for the first time to propose a modified predator-prey model that forms a non-autonomous model. However, the approximation method is utilized to convert the non-autonomous model to an autonomous one by simplifying the mathematical analysis and following the dynamical behaviors. Some theoretical properties of the proposed autonomous model like the boundedness, stability, and Kolmogorov conditions are studied. This paper's analytical results demonstrate that the dynamic behaviors are globally stable and that the rescue effect improves the likelihood of coexistence compared to when there is no rescue impact. Furthermore, numerical simul

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Secure communications by chaotic carrier signal using Lorenz model
...Show More Authors

In this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Mar 31 2025
Journal Name
Iraqi Statisticians Journal
Hypothesis Testing for Non-Normal Multiple Compact Regression Model
...Show More Authors

Generalized multivariate transmuted Bessel distribution belongs to the family of probability distributions with a symmetric heavy tail. It is considered a mixed continuous probability distribution. It is the result of mixing the multivariate Gaussian mixture distribution with the generalized inverse normal distribution. On this basis, the paper will study a multiple compact regression model when the random error follows a generalized multivariate transmuted Bessel distribution. Assuming that the shape parameters are known, the parameters of the multiple compact regression model will be estimated using the maximum likelihood method and Bayesian approach depending on non-informative prior information. In addition, the Bayes factor was used

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Linguistic Fuzzy Trust Model over Oscillating Wireless Sensor Networks
...Show More Authors

Simulation  of  the  Linguistic  Fuzzy Trust  Model  (LFTM)  over  oscillating  Wireless  Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Employ 6D-BIM Model Features for Buildings Sustainability Assessment
...Show More Authors
Abstract<p>To translate sustainable concepts into sustainable structure, there is a require a collaborative work and technology to be innovated, such as BIM, to connect and organize different levels of industry e.g. decision-makers, contractors, economists, architects, urban planners, construction supplies and a series of urban planning and strategic infrastructure for operate, manage and maintain the facilities. This paper will investigate the BIM benefits as a project management tool, its effectiveness in sustainable decision making, also the benefit for the local industry key stakeholders by encouraging the BIM use as a project management tool to produce a sustainable building project. This p</p> ... Show More
View Publication
Scopus (18)
Crossref (13)
Scopus Crossref
Publication Date
Thu Feb 27 2020
Journal Name
Journal Of Mechanics Of Continua And Mathematical Sciences
SUGGESTING MULTIPHASE REGRESSION MODEL ESTIMATION WITH SOME THRESHOLD POINT
...Show More Authors

The estimation of the regular regression model requires several assumptions to be satisfied such as "linearity". One problem occurs by partitioning the regression curve into two (or more) parts and then joining them by threshold point(s). This situation is regarded as a linearity violation of regression. Therefore, the multiphase regression model is received increasing attention as an alternative approach which describes the changing of the behavior of the phenomenon through threshold point estimation. Maximum likelihood estimator "MLE" has been used in both model and threshold point estimations. However, MLE is not resistant against violations such as outliers' existence or in case of the heavy-tailed error distribution. The main goal of t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
1-DOF Model for Fluid-Structure-Interaction Vibration Analysis
...Show More Authors

In this paper an attempt to provide a single degree of freedom lumped model for fluid structure interaction (FSI) dynamical analysis will be presented. The model can be used to clarify some important concept in the FSI dynamics such as the added mass, added stiffness, added damping, wave coupling ,influence mass coefficient and critical fluid depth . The numerical results of the model show that the natural frequency decrease with the increasing of many parameters related to the structure and the fluid .It is found that the interaction phenomena can become weak or strong depending on the depth of the containing fluid .The damped and un damped free response are plotted in time domain and phase plane for different model parameters It is fou

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression based on Non-Linear Polynomial Prediction Model
...Show More Authors