Preferred Language
Articles
/
jcofarts-679
Artistic and intellectual embodiment of the stream of consciousness approach in the film novelist: نهاد حامد ماجد
...Show More Authors

In the midst of the public narrative film , we discussed the issue of dealing with the current narrative more specialized which its future dimension form shift and twist on the level of construction narrative film in some of its diverse and renewable trends in its two ways theoretical and practical and non-give important implications for the modes of operation of the renewable narrative structures and the fact that the cinema is an arts which always open to ideas in neighboring fields and this come naturally as a result of the continuing intellectual and knowledge sharing between cinema and other science . our current research has already begun to address the issue in a stream of consciousness narrative structure film based on all that the most important ideas and theories that have been made about the concept (stream of consciousness) which emanating mainly from the field of analytical psychology , and it should be noted that the term has been used narrative sense and early in the field of literature novelist and by the novelist and theorist ( William James ) and finally settled in the film practically …thus the current study (artistic and intellectual approach to the construction of the stream of consciousness in the film novelist) dealt four chapters have been search through them in the midst of this issue, the form of the first chapter of systematic research framework and which have been addressing the problem of research and emphasis on the importance of this study and its narrative studies of modern art film … In addition to the goals set by the researcher, the research has moved in the range of its theoretical part about all that is written about the stream of consciousness as a holistic approach and the narrative has privacy and intellectually based in distinct narrative speeches …In its application part the research has been sets in a model applied one representing the film (the boy) for reason that will mentioned later.In the second chapter, which came under the title (the theoretical framework) , research charted his way through access to the most important ideas and theories that have been made about the concept of stream of consciousness and what constitutes the basis and reference can be invoked in the analysis and to enter in to the subject and read it as systematic process and practical which based on the clear concept of stream of consciousness .. This research included three topics, first titled (stream of consciousness term and concept ) in which the researcher cleared the emergence of the term and distinguish it from what is Described Alsaiklogi stories… The second section was titled ( technical approach to stream of consciousness ) and it has been dealt with engaging narrative logic of the approach according to the stream of consciousness ..The third section came under the title (the construction of time in the stream of consciousness) to be an integral link and former two sections , and it was to clarify the nature of the contrary and the task by which the time can be constructed according to the approach of stream of consciousness .. In the third chapter , which came under the title ( research procedures ) were introduced to the methodology of research and search tool and the limits of research and sample neshat and the reasons for selecting the sample .. In the fourth chapter included ( research and the results of the most important conclusions ) that have been drawn from the search after neshat sample analysis followed by a list of sources approved by the research , and summary in English

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 14 2021
Journal Name
Iraqi Journal Of Physics
Investigation of nonlinear optical properties for laser dyes-doped polymer thin film
...Show More Authors

Solutions of dyes Rhodamine 6G (Rh6G) and Coumarin480(C480) were prepared at five concentrations (1x10-3, 5x10-4, 1x10-4, 5x10-5 and1x10-5) mol/l, the mixing was stirred to obtain on a homogenous solution, the(poly methyl-methacrylate) (PMMA) was solved by chloroform solvent with certain ratio, afterward (PMMA+Rh6G) and (PMMA+C480) thin films were prepared by casting method on glass block which has substrate with dimensions (7.5 x2.5)cm2, the prepared samples were left in dark place at room temperature for 24 hours to obtain uniform and homogenous thin films. UV-VIS absorption spectra, transmission spectra and fluorescence spectra were done to measure linear refractive index and linear absorption coefficient. The nonlinear optical proper

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 12 2007
Journal Name
Iraqi Journal Of Laser
Nonlinear Optical Properties of CdS Thin Film Nanoparticles Using z-Scan Technique
...Show More Authors

In the present work, a z-scan technique was used to study the nonlinear optical properties, represented by the nonlinear refractive index and nonlinear absorption coefficients of nanoparticles cadmium sulfide thin film. The sample was prepared by the chemical bath deposition method. Several testing were done including, x-ray, transmission and thickness of thin film. z-Scan experiment was performed at two wavelengths (1064 nm and 532 nm) and different energies. The results showed the effect of self-focusing in the material at higher intensities, which evaluated n2 to be (0.11-0.16) cm2/GW. The effect of two-photon absorption was studied, which evaluated β to be (24-106) cm/GW. In addition, the optical limiting behavior has been studied.

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 02 2017
Journal Name
International Journal Of Science And Research (ijsr)
Experimental Investigation on Rheological Characterization of ecovio® F Film C2203biopolymer Melts
...Show More Authors

Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Rapid thermal oxidation of copper nanostructure thin film for solar cell fabrication
...Show More Authors

In the present work is the deposition of copper oxide using the pulsed laser deposition technique using Reactive Pulsed Laser as a Deposition technique (RPLD), 1.064μm, 7 nsec Q-switch Nd-YAG laser with 400 mJ/cm2 laser energy’s has been used to ablated high purity cupper target and deposited on the porous silicon substrates recorded and study the effect of rapid thermal annealing on the structural characteristics, morphological, electrical characteristics and properties of the solar cell. Results of AFM likelihood of improved absorption, thereby reducing the reflection compared with crystalline silicon surface. The results showed the characteristics of the solar cell and a clear improvement in the efficiency of the solar cell in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Phonological and Suggestive Rhythm in the Context of the Quranic Text: The Phonological and Suggestive Rhythm in the Context of the Quranic Text
...Show More Authors

Abstract
The perpetuity of the Quranic discourse required being suitable for all ages.
Accordingly, the method of the Glorious Quran a pre request for the conscious
investigation and realization in order to detect the core of the texts, as the Quranic
discourse is considered a general address for the humanity as a whole. For this
reason, the progress of the concerned studies neceiated that it should cope with the
current development in the age requirements and its cultural changes within ages.
The texts of the Glorious Quran lightened the human reason as being the
Creator’s miracle for it is characterized by certain merits that makes it different from

poetry and prose. It is a unique texture in its rheto

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Organizational Tactics An Approach to Strategic Agility A field study in a sample of mobile operators in Iraq
...Show More Authors

The current research dealt with the issue of organizational skillfulness as an entry point to reach strategic agility. The study has been tested in Iraq's mobile operators - Asia Cell, Zain Iraq and Cork Telecom. The study was applied to a sample of (93) managers distributed at various levels of management (board members, general managers, commissioners, department managers, people managers, unit managers, office managers). The survey used the questionnaire as a key tool for collecting data and information as well as personal interviews. It has sought to test a number of hypotheses related to correlation and influence relationships between the variables of the study, in order to answer the questions related to the problem of stud

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Dec 14 2022
Journal Name
Journal Of The College Of Languages (jcl)
Images of ruin in "Throne" and " Water stream" by Maysaloon Hadi and "War" by Glezio: A Compartive Study: Les images du débris dans "Le trône et le ruisseau " de Maysaloon Hadi et "La guerre" de Le Glézio (étude comparative)
...Show More Authors

Our research comes to shed light on Iraqi literature as literature that arose in special circumstances alongside foreign literature. Using comparative research methods, we chose to highlight two distinguished writers, who have their mark in the world of literature. The first is the Iraqi writer Maysaloun Hadi, who is considered an icon of Iraqi feminist literature, and the second is the French writer Le Clézieu, who won the Nobel in 2008. We will see through the research how the two authors expressed their views of modernity and urbanism. And how each of them separately portrayed the psychological and moral projections that formed the essence of man today. 

Résumé

Notre recherche abord un des points inc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 03 2020
Journal Name
Journal Of Public Affairs
Ethnographic research method for psychological and medical studies in light of COVID ‐19 pandemic outbreak: Theoretical approach
...Show More Authors

Ethnographic research is perhaps the most common applicable type of qualitative research method in psychology and medicine. In ethnography studies, the researcher immerses himself in the environment of participants to understand the cultures, challenges, motivations, and topics that arise between them by investigating the environment directly. This type of research method can last for a few days to a few years because it involves in-depth monitoring and data collection based on these foundations. For this reason, the findings of the current study stimuli the researchers in psychology and medicine to conduct studies by applying ethnographic research method to investigate the common cultural patterns language, thinking, beliefs, and behavior

... Show More
View Publication
Publication Date
Tue May 01 2018
Journal Name
International Journal Of Computer Trends And Technology
Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512
...Show More Authors

Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v

... Show More
View Publication Preview PDF
Crossref