Preferred Language
Articles
/
jcofarts-773
Visual illusion in Contemporary Theatre décor A Study in technical Variables: سامي علي حسين
...Show More Authors

Our research deals with the role of theatrical decoration in creating visual thumbs and the effect achieved as a result in the theatrical presentation in terms of supporting the idea of centralization of the dramatic construction of the show, as the researcher emphasizes that this topic has begun with a new horizon removed many technical concepts and knowledge in the theater.
Horizon knowledge and discoveries based on the structures of light and sight to achieve an existing transformation from steel to ethereal. According to these new concepts, systems other than those based on old methods of presentation have been formed.
In light of this, the researcher divided his research into:
First: the problem of research and the need for it. The researcher asked the problem a number of questions, the most important of which is: how does the illusion in the theater affect the phenomenon of receiving. He also set his goal of revealing the visual illusion in contemporary theatrical décor. He linked the importance of research in the fact that it benefits scholars and workers in the theatrical production industry.
The researcher addressed in the second chapter (cognitive framework) the structure of illusion in theatrical decoration based on the image in the visual art is considered to be deceptive and shaded and the information is collected by the sense of sight and then treated by the brain . Where the illusion of reading the image occurs through the theoretical manipulation of the drawing of the work.
In the last chapter, the researcher adopted the descriptive analytical method of reading the levels of the sample and the directing treatment and the role of visual deception in the illusion achieved in the research and his awareness of the play (Facebook) which was presented on the national stage in Baghdad in March 2011 by the preparation and directing (Imad Mohammed) and representation (Mohammed Hashem), and then reached the researcher at the end of his research to the most important results and the most prominent conclusions and sealed the list of sources and references on which he relied.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 23 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Plant-derived Molecules for the Treatment of Tuberculosis: A Review
...Show More Authors

Synthetic anti-TB drugs are being used to treat tuberculosis (TB) as they are effective, however, they are accompanied by many side effects. The disease has remained largely uncured till date. The use of plant extracts or phytochemicals along with the anti-TB drugs is a very attractive strategy to make the treatment more effective as phytochemicals have no side-effects, are much less toxic than synthetic anti-TB drugs, are safe to use and most importantly, do not produce resistant strains as opposed to synthetic anti-TB drugs. Approximately 420,000 plant species have been identified globally and among them only a few have been explored for their therapeutic potential. Traditional medicine in different parts of the world has employed crud

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Constructing a new mixed probability distribution with fuzzy reliability estimation
...Show More Authors

This paper deals with constructing mixed probability distribution from mixing exponential

Scopus (5)
Scopus
Publication Date
Thu Oct 01 2020
Journal Name
Defence Technology
A novel facial emotion recognition scheme based on graph mining
...Show More Authors

Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Mon Aug 26 2019
Journal Name
Iraqi Journal Of Science
Two-Component Generalization of a Generalized the Short Pulse Equation
...Show More Authors

     In this article, we introduce a two-component generalization for a new generalization type of the short pulse equation was recently found by Hone and his collaborators. The coupled of nonlinear equations is analyzed from the viewpoint of Lie’s method of a continuous group of point transformations. Our results show the symmetries that the system of nonlinear equations can admit, as well as the admitting of the three-dimensional Lie algebra. Moreover, the Lie brackets for the independent vectors field are presented. Similarity reduction for the system is also discussed.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
A reliable numerical simulation technique for solving COVID-19 model
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
The Peristaltic Flow of Jeffrey Fluid through a Flexible Channel
...Show More Authors

    The purpose of this study is to calculate the effect of the elastic wall of a hollow channel of Jeffrey's fluid by peristaltic flow through two concentric cylinders. The inside tube is cylindrical and the outside is a regular elastic wall in the shape of a sine wave. Using the cylindrical coordinates and assuming a very short wavelength relative to the width of the channel to its length and using governing equations for Jeffrey’s fluid in Navier-Stokes equations, the results of the problem are obtained. Through the Mathematica  program these results are  analysed.

View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Sun May 26 2019
Journal Name
Iraqi Journal Of Science
A Random Laser Production Using Fluorescein Dye Doped TiO2 Nanoparticles
...Show More Authors

A random laser has been produced using Fluorescein dye solution in water, with concentration of (8 10-5 M); doped with (0.001g) TiO2 Nanoparticles with the particle size of (15.7 nm). A blue diode laser of 450 nm wavelength has been used as an optical pumping source. The wavelength of the random laser was 523 nm and the intensity was 5.44 mW

View Publication Preview PDF
Scopus (4)
Crossref (5)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Historical Value of Dickens’s A Tale of Two Cities
...Show More Authors

In "historical" fiction, characters that never really existed, give expression to the impact of historical events on the people who really did live through them. The result is not history, as an accurate record of actual events, but fiction in which an earlier age is rendered through the personal joys and sufferings of characters. This paper
aims at investigating the historical realities presented in Dickens’s A Tale of Two Cities.

View Publication Preview PDF