Drama is one of the means of transmitting human experiences, as it presents within it the life ideas and visions of the spectator, who is subject to their influence on him, robbed of the will in front of its charm and various display arts, which invade him with its dimensions and affect his references, and this art form is based on stories revolving around personalities involved in events that have grown As a result of the struggle of two conflicting opponents, or two opposing forces or emotions generated as a result of a voluntary conflict, as this dramatic conflict represents the most important elements of those events, as it is embodied in an inevitable scene that emerges from other scenes, and this scene is sometimes subject to the expectations of the viewer who focuses all his efforts waiting for the moment of collision, Which, in turn, represents an Obligatory and binding scene that must be reached, and for this the researcher found it necessary to shed light on this topic because of its importance, so the research problem was represented in the following question: (What are the dramatic necessities that require the presence of an Obligatory Scene in the structure of the cinematic film?) As for the theoretical framework, it included two topics: the first: Obligatory Scene: Concept and Operation, and the second: the visual and sound foundations of the Obligatory scene in the narrative film. While the research procedures, the descriptive-analytical approach was taken, and an intentional sample that meets the research objectives, which included the king speech 2010 movie. The study concluded a number of results and conclusions.
Wastewater treatment plants operators prefer to make adjustments because they are more cost effective, to use the existing tank instead of building new ones. In this case an imported materials would be used as bio-loads to increase biomass and thus maintain efficiency as the next organic loading increases.In the present study, a local substance "pumice stone" was used as a biological carrier in the aeration tank, and the experiments were carried out in five stages: without biological carriers, filling ratio of 4%,10%,20%, and25% with pumice stone, the maximum organic loading at each stage (1.1884, 1.2144, 1.9432, 2.7768, 3.3141)g BOD /l.d respectively.Other experiments were carried out to determine the best filling ratio, the SS remova
... Show MoreThere is a great deal of systems dealing with image processing that are being used and developed on a daily basis. Those systems need the deployment of some basic operations such as detecting the Regions of Interest and matching those regions, in addition to the description of their properties. Those operations play a significant role in decision making which is necessary for the next operations depending on the assigned task. In order to accomplish those tasks, various algorithms have been introduced throughout years. One of the most popular algorithms is the Scale Invariant Feature Transform (SIFT). The efficiency of this algorithm is its performance in the process of detection and property description, and that is due to the fact that
... Show MoreDetection of early clinical keratoconus (KCN) is a challenging task, even for expert clinicians. In this study, we propose a deep learning (DL) model to address this challenge. We first used Xception and InceptionResNetV2 DL architectures to extract features from three different corneal maps collected from 1371 eyes examined in an eye clinic in Egypt. We then fused features using Xception and InceptionResNetV2 to detect subclinical forms of KCN more accurately and robustly. We obtained an area under the receiver operating characteristic curves (AUC) of 0.99 and an accuracy range of 97–100% to distinguish normal eyes from eyes with subclinical and established KCN. We further validated the model based on an independent dataset with
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More