Our research deals with the role of theatrical decoration in creating visual thumbs and the effect achieved as a result in the theatrical presentation in terms of supporting the idea of centralization of the dramatic construction of the show, as the researcher emphasizes that this topic has begun with a new horizon removed many technical concepts and knowledge in the theater.
Horizon knowledge and discoveries based on the structures of light and sight to achieve an existing transformation from steel to ethereal. According to these new concepts, systems other than those based on old methods of presentation have been formed.
In light of this, the researcher divided his research into:
First: the problem of research and the need for it. The researcher asked the problem a number of questions, the most important of which is: how does the illusion in the theater affect the phenomenon of receiving. He also set his goal of revealing the visual illusion in contemporary theatrical décor. He linked the importance of research in the fact that it benefits scholars and workers in the theatrical production industry.
The researcher addressed in the second chapter (cognitive framework) the structure of illusion in theatrical decoration based on the image in the visual art is considered to be deceptive and shaded and the information is collected by the sense of sight and then treated by the brain . Where the illusion of reading the image occurs through the theoretical manipulation of the drawing of the work.
In the last chapter, the researcher adopted the descriptive analytical method of reading the levels of the sample and the directing treatment and the role of visual deception in the illusion achieved in the research and his awareness of the play (Facebook) which was presented on the national stage in Baghdad in March 2011 by the preparation and directing (Imad Mohammed) and representation (Mohammed Hashem), and then reached the researcher at the end of his research to the most important results and the most prominent conclusions and sealed the list of sources and references on which he relied.
This study aimed to isolate and phenotype lymphocytes in untreated children patients with chronic allergic asthma. To reach such aim the study involved (25) patients from children (17 male and 9 female) whom their ages where between (3-10) years, in addition to (15) apparently healthy children (9 male and 6 female) in the same ages involved as control group. The data demonstrated that there was a significant increase in the mean percentages of T-lymphocytes (CD3+ cells) in the peripheral blood of patients (66.75±0.29)**, in comparison with control group (43.58±0.19), a significant increase in the mean percentages of T-helper lymphocytes (CD4+ cells) in the pe
... Show MoreSocial interaction is the platform that enables people to connect and practice language. Active listening stimulates them to understand the language they are speaking. The problem of the study highlights that less attention to listening among speaking, reading, and writing skills causes the weakness of collaborative learning. This paper contributes to characterizing the effectiveness of collaborative learning in developing learner’s listening skills. It aims to underscore the role of target language learners as members of the learning groups and of the teacher in the collaborative learning process. 130 Iraqi EFL teachers from different colleges at the University of Baghdad participated in this study. The scores in the statistical data wer
... Show MoreIn our current era, women need to practice sports activities in order to compensate for the lack of movement. The development of life and the introduction of technology in all fields contributed to reducing body movements to the maximum. Many movements were also shortened, and some parts of the body became almost static. All machines became available in homes. Necessary to help women clean and cook. The presence of transportation also restricted women, so the walking sport that women used to practice when they went shopping in nearby places or to visit friends disappeared. As a result, many health problems emerged, prompting some developed countries to allocate financial aid with the help of insurance companies to these patients.The researc
... Show Morestudy was conducted on a stretch of Tigris river crossing Baghdad city to determine the concentration of some chlorophenols pollutants. Aqueous samples were preliminary enriched about 500 times and the chlorophenols have determined using high performance liquid chromatography HPLC. Limits of detection LOD were (0.007–0.012 mg L-1), relative standard deviations RSD% were 2.4%–5.59% and relative recoveries were 51.06%– 104.07%. The existence of chlorophenols in Tigris river was in the range 0.023–4.596 mg L-1. The developed method suggested in this study can be applied for routine analysis and monitoring of chlorinated phenols in environmental aqueous samples.
An experimental investigation based on thirty three simple pullout cylinder specimens was conducted to study the bond-slip trend between concrete and steel reinforcement. Plain and deformed steel reinforcement bars were used in this investigation. The effect of bar diameter, concrete compressive strength and development length on bond-slip relation was detected. The results showed that the bond strength increases with increasing of compressive strength and with decreasing of bar diameter and development length. A nonlinear regression analysis for the experimental results yields in a mathematical correlation to predict the bond strength as a function of concrete compressive strength, reinforcing bar diameter and its yield stress. The minimum
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show More
