Preferred Language
Articles
/
jcofarts-679
Artistic and intellectual embodiment of the stream of consciousness approach in the film novelist: نهاد حامد ماجد
...Show More Authors

In the midst of the public narrative film , we discussed the issue of dealing with the current narrative more specialized which its future dimension form shift and twist on the level of construction narrative film in some of its diverse and renewable trends in its two ways theoretical and practical and non-give important implications for the modes of operation of the renewable narrative structures and the fact that the cinema is an arts which always open to ideas in neighboring fields and this come naturally as a result of the continuing intellectual and knowledge sharing between cinema and other science . our current research has already begun to address the issue in a stream of consciousness narrative structure film based on all that the most important ideas and theories that have been made about the concept (stream of consciousness) which emanating mainly from the field of analytical psychology , and it should be noted that the term has been used narrative sense and early in the field of literature novelist and by the novelist and theorist ( William James ) and finally settled in the film practically …thus the current study (artistic and intellectual approach to the construction of the stream of consciousness in the film novelist) dealt four chapters have been search through them in the midst of this issue, the form of the first chapter of systematic research framework and which have been addressing the problem of research and emphasis on the importance of this study and its narrative studies of modern art film … In addition to the goals set by the researcher, the research has moved in the range of its theoretical part about all that is written about the stream of consciousness as a holistic approach and the narrative has privacy and intellectually based in distinct narrative speeches …In its application part the research has been sets in a model applied one representing the film (the boy) for reason that will mentioned later.In the second chapter, which came under the title (the theoretical framework) , research charted his way through access to the most important ideas and theories that have been made about the concept of stream of consciousness and what constitutes the basis and reference can be invoked in the analysis and to enter in to the subject and read it as systematic process and practical which based on the clear concept of stream of consciousness .. This research included three topics, first titled (stream of consciousness term and concept ) in which the researcher cleared the emergence of the term and distinguish it from what is Described Alsaiklogi stories… The second section was titled ( technical approach to stream of consciousness ) and it has been dealt with engaging narrative logic of the approach according to the stream of consciousness ..The third section came under the title (the construction of time in the stream of consciousness) to be an integral link and former two sections , and it was to clarify the nature of the contrary and the task by which the time can be constructed according to the approach of stream of consciousness .. In the third chapter , which came under the title ( research procedures ) were introduced to the methodology of research and search tool and the limits of research and sample neshat and the reasons for selecting the sample .. In the fourth chapter included ( research and the results of the most important conclusions ) that have been drawn from the search after neshat sample analysis followed by a list of sources approved by the research , and summary in English

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 02 2024
Journal Name
International Development Planning Review
A COMPARATIVE STUDY OF THE AMOUNT OF FORCE EXERTED ON THE GROUND AND THE TIME OF PROPULSION IN THE VERTICAL AND HORIZONTAL JUMPING TESTS FROM STABILITY USING A FOOT SCAN DEVICE
...Show More Authors

Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the tax examiner's procedures in increasing or decreasing tax revenue : Applied research in the General Authority for Taxes
...Show More Authors

Abstract:

               The tax is one of the elements of the general revenues of the state and contributes to covering its expenses. Taxes are imposed in most countries of the world. The tax proceeds depend on a set of factors that contribute either positively or negatively to the tax share by increasing or decreasing it. Therefore, the research aims to demonstrate the role of the tax examiner's procedures in achieving the validity of the taxable base and its reflection on the tax proceeds, as well as reviewing the tax examiner's procedures related to the tax return process. Examination and tax audit of the financial statements, as well as presenting the financial statements to an independent and i

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 17 2016
Journal Name
Al-academy
Optical patterns and aesthetic values in the halls of events: رواء مصطفى خلف
...Show More Authors

current research Cares about study patterns of optical and aesthetic values in the halls of occasions (weddings) because of their importance in providing an atmosphere of joy. The problem was through the study of light and its impact on the receiver and found a researcher that interior spaces allocated to the halls inappropriate in terms of functional and aesthetic so necessitated the need to study this phenomenon in order to be addressed through the study of light and its impact on the users of those spaces where research aims to current detection properties patterns optical in the internal spaces of the halls and identify some of the aesthetic values of the lighting for the interior spaces.The search consists of four chapters, the firs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
MEDIA AND CUSTOMERS: (An analytical study of the opinions and attitudes of a sample of industrialists in the role of media in directing consumers to national industries)
...Show More Authors

The talk about the relationship between the media and industrialists can be the core of a bigger and deeper subject which is the role of these means in increasing sales : First, increasing the customer’s awareness of the importance of goods and the result of the promotion of products. Secondly, increasing investments which do require continuous studies and deep research in order to understand the constantly changing market conditions, and the public’s taste. In this research, we try to find out how industrialists see the role of media in the promotion of products in Iraq today, and how it develops in the future.

There was a reluctance of the industrialists to advertise in the local media, also industrialists see the role of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 22 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE EFFECT OF FERMENTATION AND BAKING PROCESSES ON THE PHYATE DEGRADATION DURING THE PROCESS OF MANUFACTURING WHOLE WHEAT FLOUR BREAD.: THE EFFECT OF FERMENTATION AND BAKING PROCESSES ON THE PHYATE DEGRADATION DURING THE PROCESS OF MANUFACTURING WHOLE WHEAT FLOUR BREAD.
...Show More Authors

In this research, the influence of the fermentation treatments and baking in Iraqi’s flour type (Ibaa 99, Al-rashed, Tamus, Abu-grabe) and Turkish flour type (Muaamel) on phytic acid was investigated. In whole wheat flour, the phytic acid was (1500, 1290, 1450, 1230, 1440 ( mg/ 100 g flour respectively, and the inorganic phosphorous was (29.18, 25.15, 23.89, 20.85, 22.83) mg/100 g flour respectively. The dough prepared from flour with a higher phytic acid content also contained higher amount of phytic acid. During fermentation, degradation of phytic acid occurred. The cumulative loss of phytic acid after fermentation in all type of dough was ~ 23, 22, 34, 26 and 27% respectively،While increased of inorganic phosphorous occurred. The c

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Begging Phenomenon Between the Destitution Plight and the Material Greedy - A Field Study in the City of Baghdad
...Show More Authors

Begging is an ancient social phenomenon since the Man's creation. It was simple at its beginning to get a living and the family needed, but presently, this simple social phenomenon converted to a big phenomenon which controlled by competent groups away from the values and principles. Their doings are far from humanity representing by the cutting of a hand or a foot and facial distortion or removed eye as a way of attracting people's emotions to get material and incorporeal helps; these doings became a trade which is exchanged by slave traders. Furthermore, different illegal and greedy methods were followed as a way of blackmailing others; contrariwise other cases of begging are doing by a people who real poor and needy. In this case, the

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The Evaluation of Information Security Management System in the Iraqi Commission for Computers and Informatics according to the International Standard (ISO 27001: 2013)
...Show More Authors

    The current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations  dependence on computers and information technology in work and communication  with others. The international legitimacy (represented by the  International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 16 2026
Journal Name
Journal Of Sport Sciences
The school system and its relationship to the evolution of some indicators of physical and functional skills in a lesson and basketball
...Show More Authors

View Publication
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Cybersecurity And Information Management
A New Automated System Approach to Detect Digital Forensics using Natural Language Processing to Recommend Jobs and Courses
...Show More Authors

A resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF