Preferred Language
Articles
/
jcofarts-559
Semiotics of Musical Sign in Iraqi Pantomime Show (Ahriman) as a Model: علي عدي صاحب-شيماء حسين طاهر
...Show More Authors

The musical sign was associated with the first appearances of acting that are based on human gestures and expressive and silent movements, and they contributed in accentuating and clarifying these gestures and explain their meanings and indications, and they remained with them until these gestures turned into artistic theatrical shows so that the musical sign would have many functions and constitute the main pillars for this kind of show.
The musical sign is a language not much different than the human language in the semiotic analysis. There has been an increased interest in it and its use in the mime shows by the graduates who realized its necessity and significance in the pantomime show intellectually, artistically and aesthetically. The first chapter included (the theoretical framework) which consists of the research problem represented by the following question: (Does the musical sign in the pantomime show have different indications and functions in other theatrical shows?). it also included the research importance in highlighting the musical sign, as the mime actor performance is a sign performance that excludes the verbal sign from the process of conveying the indication to the recipient. The research objective is limited to (semiotics of the musical sign in Iraqi pantomime show (Ahriman) as a model. This chapter consists of research limits (temporally determined by 2014) and spatially by the shows presented in Baghdad, Ali Deayym's show, and then defining the terms of the research and concluded with procedural definitions.
The second chapter consisted of (the theoretical framework and the previous studies). The first section is (the concept of the theatrical sign). The second section addresses the musical sign and its performative features in the pantomime show. The second chapter concluded with the indicators that resulted from the theoretical framework. The third chapter is dedicated for (the research procedures) and the indicators that resulted from the theoretical framework as it is a tool for the analysis within an (analytical) descriptive method and watching the shows and photographs, so the show (Ahriman) directed by (Ali Deayym ) in (2014) in an intentional method for certain reasons justified by the researchers to keep pace with the sections and to achieve the study objectives and to resolve its problem. The fourth chapter ended with a number of results including:

1- The musical sign created the rhythm of the show.
2- The musical sign declares the dramatic transformation and transition.
Then the research ends with an abstract.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 25 2017
Journal Name
Al-khwarizmi Engineering Journal
A new Cumulative Damage Model for Fatigue Life Prediction under Shot Peening Treatment
...Show More Authors

 Abstract

In this paper, fatigue damage accumulation were studied using many methods i.e.Corton-Dalon (CD),Corton-Dalon-Marsh(CDM), new non-linear model and experimental method. The prediction of fatigue lifetimes based on the two classical methods, Corton-Dalon (CD)andCorton-Dalon-Marsh (CDM), are uneconomic and non-conservative respectively. However satisfactory predictions were obtained by applying the proposed non-linear model (present model) for medium carbon steel compared with experimental work. Many shortcomings of the two classical methods are related to their inability to take into account the surface treatment effect as shot peening. It is clear that the new model shows that a much better and cons

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Sensors
A Modern Approach towards an Industry 4.0 Model: From Driving Technologies to Management
...Show More Authors

Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph

... Show More
View Publication
Scopus (119)
Crossref (98)
Scopus Clarivate Crossref
Publication Date
Fri Nov 10 2017
Journal Name
Al–bahith Al–a'alami
Role of the Iraqi Media Organizations in Promoting The Sense of Citizenship among Iraqi University Youth
...Show More Authors

    This study examines the role played by the Iraqi media in promoting the values ​​of citizenship and the dimensions of the various sectors of Iraqi society, an important segment namely university youth section.
 The study intended to identify “the role of the Iraqi media organizations in promoting The sense of citizenship among young Iraqi university”, through: -
1. Identifying the most important Iraqi media, which works to promote the dimensions of citizenship and values.
2. To identify the extent of the contribution of the Iraqi media in promoting citizenship in dimensions (patriotic belonging, legal, political, economic, social, cultural).
The study provided a set of hypotheses, namely:-

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Predicting Social Security Fund compensation in Iraq using ARMAX Model
...Show More Authors

Time series have gained great importance and have been applied in a manner in the economic, financial, health and social fields and used in the analysis through studying the changes and forecasting the future of the phenomenon. One of the most important models of the black box is the "ARMAX" model, which is a mixed model consisting of self-regression with moving averages with external inputs. It consists of several stages, namely determining the rank of the model and the process of estimating the parameters of the model and then the prediction process to know the amount of compensation granted to workers in the future in order to fulfil the future obligations of the Fund. , And using the regular least squares method and the frequ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
CFIA-Turbidimetric and Photometric Determination of Vitamin B9 (Folic acid) Using LEDs as a Source of Irradiation and Two Solar Cells as an Energy Transducer
...Show More Authors

A specific, sensitive and simple method was used for the determination of: vitamin B9 (Folic acid) in pure and pharmaceutical formulations using continuous flow injection analysis. The method is based on formation of ion pair compound between folic acid and ammonium molybdate in an aqueous medium to obtain a gray precipitate complex, using homemade; Ayah-6SX1-ST-2D solar cell CFI Analyzer. Optimum parameters was studied to increase the sensitivity for developed method. The linear range for the calibration graph was 0.01-0.6 mMol.L-1 of vitamin B9 and LOD was 131.994 ng/sample with correlation coefficient ( r ) of 0.9810, RSD% was lower than 0.1%, (n=9) for the determination of vitamin B9 at concentration (0.07and 0.5) mMol.L-1 respectiv

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Mon Sep 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Suggested Model for accounting disclosure proactive and reflect on the decisions of investors: Applied research in a sample of industrial companies listed on the Iraq Stock Exchange
...Show More Authors

Often requires the investor to know the result of the company's activity contribute to the investor or by wanting to invest in them because profit or loss of the company affect positively or negatively in the price of shares of the company and with the end of the fiscal year delayed companies often to issue its financial statements after it is approved and audited by an observer External Auditor, From here came the idea of ​​research that appears to stakeholders of financial statements proactive appear, including actual figures for earlier stages have been prepared lists about lists and planned by the administration reflect the results of its phase remainder of the year as if they are (half a year or season or month) to offer At the

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 02 2022
Journal Name
Nankai Business Review International
Evaluating the dimensions of strategic intent according to the Hamel and Prahalad model/a case study in Oil Projects SCOP Company
...Show More Authors
Purpose

The purpose of this study is to examine the dimensions of strategic intent (SI; see Appendix 1) according to the Hamel and Prahalad model as a building for the future, relying on today’s knowledge-based and proactive strategic directions of management as long-term and deep-perspective creative directions, objective vision and rational analysis, integrative in work, survival structure and comprehensiveness in perception.

Design/methodology/approach

The quantitative approach was used based on research, detection and proof, as data were collected from leader

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Jul 18 2022
Journal Name
International Journal Of Early Childhood Special Education
The effectiveness of a proposed teaching strategy according to The Common Knowledge Construction Model in Mathematical Proficiency for middle school student
...Show More Authors

This research aims to know the effectiveness of teaching with a proposed strategy according to the common Knowledge construction modelin mathematical proficiency among students of the second middle class. The researchers adopted the method of the experimental approach, as the experimental design was used for two independent and equal groups with a post-test. The experiment was applied to a sample consisting of (83) students divided into two groups: an experimental comprising (42) students and a control group, the second comprising (41) students., from Badr Shaker Al-Sayyab Intermediate School for Boys, for the first semester of the academic year (2021-2022), the two groups were rewarded in four variables: (chronological age calculated in mo

... Show More