Our research deals with the role of theatrical decoration in creating visual thumbs and the effect achieved as a result in the theatrical presentation in terms of supporting the idea of centralization of the dramatic construction of the show, as the researcher emphasizes that this topic has begun with a new horizon removed many technical concepts and knowledge in the theater.
Horizon knowledge and discoveries based on the structures of light and sight to achieve an existing transformation from steel to ethereal. According to these new concepts, systems other than those based on old methods of presentation have been formed.
In light of this, the researcher divided his research into:
First: the problem of research and the need for it. The researcher asked the problem a number of questions, the most important of which is: how does the illusion in the theater affect the phenomenon of receiving. He also set his goal of revealing the visual illusion in contemporary theatrical décor. He linked the importance of research in the fact that it benefits scholars and workers in the theatrical production industry.
The researcher addressed in the second chapter (cognitive framework) the structure of illusion in theatrical decoration based on the image in the visual art is considered to be deceptive and shaded and the information is collected by the sense of sight and then treated by the brain . Where the illusion of reading the image occurs through the theoretical manipulation of the drawing of the work.
In the last chapter, the researcher adopted the descriptive analytical method of reading the levels of the sample and the directing treatment and the role of visual deception in the illusion achieved in the research and his awareness of the play (Facebook) which was presented on the national stage in Baghdad in March 2011 by the preparation and directing (Imad Mohammed) and representation (Mohammed Hashem), and then reached the researcher at the end of his research to the most important results and the most prominent conclusions and sealed the list of sources and references on which he relied.
In this paper, the general framework for calculating the stability of equilibria, Hopf bifurcation of a delayed prey-predator system with an SI type of disease in the prey population, is investigated. The impact of the incubation period delay on disease transmission utilizing a nonlinear incidence rate was taken into account. For the purpose of explaining the predation process, a modified Holling type II functional response was used. First, the existence, uniform boundedness, and positivity of the solutions of the considered model system, along with the behavior of equilibria and the existence of Hopf bifurcation, are studied. The critical values of the delay parameter for which stability switches and the nature of the Hopf bifurcat
... Show MoreAbstract
The research aims to build a training program to develop some executive functions for kindergarten children. To achieve this goal, the two researchers built the program according to the following steps:
1. Determining the general objective of the program.
2. Determining the behavioral objectives of the program.
3. Determining the included content in the program.
4. Implementing the content of the activities of the program.
5. Evaluating the Program.
The program included (12) training activities, the training activities included several items: the title of the activity, the time of implementation of the activity, the general objective of the activity, the procedural behavioral objective, the means and tools u
This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreKE Sharquie, SA Al-Mashhadani, AA Noaimi, AA Hasan, Journal of Cutaneous and Aesthetic Surgery, 2012 - Cited by 19
The migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show MoreWater flow into unsaturated porous media is governed by the Richards’ partial differential equation expressing the mass conservation and Darcy’s laws. The Richards’ equation may be written in three forms,where the dependent variable is pressure head or moisture content, and the constitutive relationships between water content and pressure head allow for conversion of one form into the other. In the present paper, the “moisture-based" form of Richards’ equation is linearized by applying Kirchhoff’s transformation, which
combines the soil water diffusivity and soil water content. Then the similarity method is used to obtain the analytical solution of wetting front position. This exact solution is obtained by means of Lie’s
The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At th
... Show MoreTraditional accounting takes only one dimension (economic) in calculating the value added of the company, and all other aspects (including environmental and social) are neglected, and despite the emergence of Sustainability Accounting and the interest of companies in preparing sustainability reports, these reports are suffering from many problems, including multiple metrics used in measuring companies (cash, quantity and lavish). In addition, these reports may reach dozens of pages in some companies and this causes the problem (information overload) which affects the qualitative properties of accounting information such as appropriate and relative, which requires the need to find a tool that can measure the Sustainability Unit of
... Show More