Action films employ many artistic and literary elements that contribute greatly to building the general meaning of the film and push the wheel of the film forward. The element of mystery and suspense is used as two basic elements in action films. The cinematic language in action films depends on global coding, which is not models as it might be. It is based on logic, rather as units that aspire to morphology and not their homogeneity as the physical sense, but as the logical harmony of interpretive authority and enlightenment and in action films as a field of communication and a field in its origin in which the signifier contrasts with the perceptions of the meaning and in it takes a certain number of units preventing each other and through what The researcher summarizes the problem of his research with the following question: How to use scientific encryption to build meaning in action films?
Methodological framework: It includes the research problem, its importance, objectives, and terminology definition.
The theoretical framework: It was divided into two topics that came as follows: The first topic: scientific coding, the second topic: the production of meaning: the third topic: the code and the production of meaning in the cinematic picture: After that, the researcher reached the indicators of the theoretical framework.
Research procedures: The research method included the unit of analysis and sample analysis, which was the film (Saving Private Ryan) according to the indicators that the researcher came out with from the theoretical framework.
After analyzing the sample, the researcher came to a number of findings and conclusions, including:
1. The mark, in all its types, constitutes a point indicating many important information about the personality.
2. The global coding provides an innovative formulation that works in the field of cinematic creativity.
3. The global encryption occupies a great importance in action movies
The study aimed to evaluate Glucagon-Like Peptide-1 levels in Polycystic ovary syndrome (PCOS) infertile female with Diabetes Mellitus (DM) and compare the results with control group, also, to find the correlation for GLP-1 with Luteinizing hormone (LH), Follicle stimulating hormone (FSH) and LH/FSH ratio that may be used in prediction atherosclerosis in these patients. The study included nineteen women with age ranged (30-40) years and BMI ranged between (30-35) Kg/m 2. Subjects were divided into two groups: group (1) consist of (45) females as a healthy control and group (2) consist of (45) infertile females with PCOS and DM as complication. Fasting serum glucose was determined by using commercial kits (Biolabo SA-France); LH, FSH, prolac
... Show MoreBackground:. Children with spina bifida occulta require early surgery to prevent neurological deficits. The treatment of patients with a congenitally tethered cord who present in adulthood remains controversial.
Objective: The aim of this study is to describe the outcome obtained in 61 adult patients with congenital TCS and no prior surgical treatment who underwent surgical untethering.
Methods: This prospective study was conducted on 61 adult patients who underwent surgical untethering for spina bifida occulta at four neurosurgical centers in Baghdad / Iraq between March 2000 and January 2018. Patients who had undergone prior myelomeningocele repair or tet
... Show MoreJoints are among the most widespread geologic structures as they are found in most each exposure of rock. They differ greatly in appearance, dimensions, and arrangement, besides they occur in quite different tectonic environments. This study is important because joints provide evidence on what kind of stress produced them (history of deformation) and also because they change the characteristics of the rocks in which they occur. The Measured data of joints from the studied area which are located in the high folded zone – Northeast of Iraq, were classified according to their relationship with the tectonic axes by projecting them stereographically using Schmidt net in GEOrient ver.9.5.0 software. The joint systems revealed the orientation of
... Show Morelarization modulation plays an important role in polarization encoding in quantum key distribution. By using polarization modulation, quantum key distribution systems become more compact and more vulnerable as one laser source is used instead of using multiple laser sources that may cause side-channel attacks. Metasurfaces with their exceptional optical properties have led to the development of versatile ultrathin optical devices. They are made up of planar arrays of resonant or nearly resonant subwavelength pieces and provide complete control over reflected and transmitted electromagnetic waves opening several possibilities for the development of innovative optical components. In this work, the Si nanowire metasurface
... Show MoreThis study was carried out to study effect of magnetic water ( M0 and M) and different concentrations of coconut extract in Fragaria x ananassa (Duch) C.V Festival. The results showed significant differences in the plants treated with magnetic water ( 0.12 Tesla) and different concentrations of coconut extract C1 (0%), C2 (2.5%), C3 (5%), C4 (7.5%) and C5 (10%) in vegetative parameters as in leaf area and chlorophyll in treatment M0C3 was (53.72 Dcm2, 50.00), respectively, highest leaf number and plant dry weight in MC4 (12.77,14.22 gm), respectively. Results recorded significant differences in fruit parameters such as weight in MC1 (18.97 gm). The maximum fruit number was in MC3 (110), the greatest fruit size was in MC4 (15.78 cm3) and the
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More