This research (communicative values of the visual suggestion in TV advertising) presents a precise description for the process of conveying the communicative message through employing the visual suggestion in TV advertisements. This research consists of four chapters. The first chapter includes the research problem which is summarized by the following question: what are the communicative values accomplished in Tv advertisement which produce visual suggestions that raise strangeness and tension in the advertisement?
The research importance lies in benefiting the researchers and scholars in the field of TV advertisement direction and the visual suggestion is one the main ways for building the advertisement. It also benefits the relevant institutions and authorities and its role in reinforcing the communicative values. It also contributes to developing the intellectual and methodological visions in keeping pace with development.
The research objective is limited to revealing the communicative values of the visual suggestion and its role in TV advertising. The researcher set spatial limits represented by studying a questionnaire for the third year students, evening studies, in the department of advertising techniques/ College of Applied Arts. As for the temporal limit, it is represented by the period 2018-2019. The objective limits (the communicative values of the visual suggestion the TV adverting).
The second chapter represents the theoretical framework. It consists of two sections. The first section (communicative values in TV advertising). The second section (visual suggestion in TV advertising). In the third chapter (the research procedures), the analytical descriptive method has been adopted. The research community consists of (100) recipients from the third year students, evening studies, in the department of advertising techniques/ College of Applied Arts. They have been chosen because they are recipients and at the same time they study TV advertisements. The sample has been chosen (50%) from the original community.
The researcher used a questionnaire as a tool for the study. Chapter four consists of the results of the study which showed that the majority of the sample see that these advertisements presented to them contain the communicative values of the visual suggestion. They constitute 58% of the total sample.
In this article, the lattice Boltzmann method with two relaxation time (TRT) for the D2Q9 model is used to investigate numerical results for 2D flow. The problem is performed to show the dissipation of the kinetic energy rate and its relationship with the enstrophy growth for 2D dipole wall collision. The investigation is carried out for normal collision and oblique incidents at an angle of . We prove the accuracy of moment -based boundary conditions with slip and Navier-Maxwell slip conditions to simulate this flow. These conditions are under the effect of Burnett-order stress conditions that are consistent with the discrete Boltzmann equation. Stable results are found by using this kind of boundary condition where d
... Show MoreThis research analyses the tweets of Iraqi politicians (leaders) that took place simultaneously with the formation of the Iraqi government after the elections in 2018. The formation of the Iraqi government was considered one of the most critical issues that emerged in the political process to which the Iraqi media as well as social networking sites paid considerable attention. In this regard, Iraqi political leaders have published many tweets concerning the formation of the government, some of them have caused great controversy in the political climate. As Twitter is one of the most digital platforms that have been widely used on the global scale in recent years, politicians have employed it to publish their opinions, ideas, and to excha
... Show MoreThe present study provides a new insight into valuable information on the diverse structure of the Anisakid population and discusses the limited species richness in the Nemipterus japonicus (Bloch,1791) (Perciformes, Nemiperidae). The fishing area consists of various locations in the Arabian Gulf (29°58 0 33 00 N48°28 0 20 E). A total of 315 marine fish were examined, (n=287) were infected. Larval stages (n= 763) encysted within the mesenteries peritoneum and viscera of fish organs were isolated, with a prevalence of 91.11% of infection and, the intensity was 2.65. Molecular analysis was carried out on thirty individuals who have examined the morphology and showed some appearance differences, by amplifying internal transcribed spacers
... Show MoreThe synthesis of ligands with N2S2 donor sets that include imine, an amide, thioether, thiolate moieties and their metal complexes were achieved. The new Schiff-base ligands; N-(2-((2,4-diphenyl-3-azabicyclo[3.3.1]nonan-9-ylidene)amino)ethyl)-2-((2-mercaptoethyl)thio)-acetamide (H2L1) and N-(2-((2,4-di-p-tolyl-3-azabicyclo[3.3.1]nonan-9-ylidene)amino)ethyl)-2-((2-mercaptoethyl)thio) acetamide (H2L2) were obtained from the reaction of amine precursors with 1,4-dithian-2-one in the presence of triethylamine as a base in the CHCl3 medium. Complexes of the general formula K2<
Testing the sensitivity of periodontal pathogens requires the selection of an easier and more reliable method to be used with such anaerobic bacteria that need a long period of time for growth. Natural materials are a new era of antibacterial agents to control periodontal infections. The aims of the current study were to test the antibacterial activity of two natural agents, namely olibanum and alum, against three types of red complex periodontal pathogens and compare the application of agar diffusion and microdilution methods for testing the susceptibility. Gingival crevicular fluid from pockets with chronic infections was sampled as a source for the three types of bacteria, Porphyromonas gingivalis, Tannerella forsythia
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show More