Action films employ many artistic and literary elements that contribute greatly to building the general meaning of the film and push the wheel of the film forward. The element of mystery and suspense is used as two basic elements in action films. The cinematic language in action films depends on global coding, which is not models as it might be. It is based on logic, rather as units that aspire to morphology and not their homogeneity as the physical sense, but as the logical harmony of interpretive authority and enlightenment and in action films as a field of communication and a field in its origin in which the signifier contrasts with the perceptions of the meaning and in it takes a certain number of units preventing each other and through what The researcher summarizes the problem of his research with the following question: How to use scientific encryption to build meaning in action films?
Methodological framework: It includes the research problem, its importance, objectives, and terminology definition.
The theoretical framework: It was divided into two topics that came as follows: The first topic: scientific coding, the second topic: the production of meaning: the third topic: the code and the production of meaning in the cinematic picture: After that, the researcher reached the indicators of the theoretical framework.
Research procedures: The research method included the unit of analysis and sample analysis, which was the film (Saving Private Ryan) according to the indicators that the researcher came out with from the theoretical framework.
After analyzing the sample, the researcher came to a number of findings and conclusions, including:
1. The mark, in all its types, constitutes a point indicating many important information about the personality.
2. The global coding provides an innovative formulation that works in the field of cinematic creativity.
3. The global encryption occupies a great importance in action movies
The research mainly seeks to predict the amounts of non- oil Iraqi exports which concludes ) Food & Animals , Raw materials and non- tanned Leather and fur , Mineral fuels and Lubricating Oil , Chemical substances and amounts , Manufactured goods , Electrical and non - electrical machines , Supplies and Total non- Oil exports ) by using Markov Chain as one of Statistical approach to forecasting in future . In this search We estimate the transliteration probabilities matrix according to Maximum Likelihood on a data collected from central organization for Statistics and information technology represents an index numbers of non- Oil exports amount in Iraq from 2004 to 2015 depending on 2007 as a basic year . Results shown that trend of index
... Show MoreAbstract:
the current research aims at analyzing the efficiency of the private university teaching that recently expanded after 2003 ,;besides , the commitment of the private colleges ,definitely Al-Maamun and Al-Mansour colleges with strategy of the ministry of higher education and scientific research. This could be done through many indications that measure the efficiency of the private university teaching , including ( the indication of the efficiency of using human resources and efficiency in using the materialistic indications. But the human efficiency in these colleges , including the sample of the research ( Maamun
... Show MoreFraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.
Abstract
People are supposed to use language harmoniously and compatibly. However, aggression may characterize much of human communication. Aggression has long been recognized as a negative anti-social issue that prevails in most personal interactions. If it abounds in familial communications, it is more dangerous due to its harmful effects on individuals, and consequently on societies. Aggression refers to all the instances in which we try to get our way without any consideration for others. Moriarty’s novel (2014), Big Little Lies, is argued to represent the patterns of aggressive communications. This study aims to find out the motivations behind aggressive language in familial communication in this
... Show MoreA restrictive relative clause (RRC hereafter), which is also known as a defining relative clause, gives essential information about a noun that comes before it: without this clause the sentence wouldn’t make much sense. A RRC can be introduced by that, which, whose, who, or whom. Givon (1993, 1995), Fox (1987), Fox and Thompson (1990) state that a RCC is used for two main functions: grounding and description. When a RRC serves the function of linking the current referent to the preceding utterance in the discourse, it does a grounding function; and when the information coded in a RRC is associated with the prior proposition frame, the RRC does a proposition-linking grounding function. Furthermore, when a RRC is not used to ground a new di
... Show MoreEnglish teachers in Iraq and other countries around the world up to this time use traditional methods to help students memorize new vocabularies. The sense of words or structure is not to be given in either the native tongue or the target language by definition, but is induced by the way the form is used in the situation. Situational Language Teaching (SLT) has recently become the needed method for improving speaking skills. It indicates the application of learning the language in actual and social exchange expressions so as to let learners do as required in classroom and non-classroom circumstances. This pilot study seeks to answer the following questions: Can SLT improve English speaking skills of target learners? How SLT contribute to th
... Show MoreThis study is the first and new record to the spider Scytodes univittata Simon, 1882 (Araneae:Scytodidae)in Baghdad /Iraq , the spiders Scytodes univittata were collect from province Baghdad in Iraq , genus Scytodes belong to the family Scytodidae it is one of the most family are wide distribution around the world have 6 eyes and are slow moving , the genus Scytodes are known from the names spitting spiders ,.Female Scytodes univittata can be characteristic by :large round cephalothorax length:4.45 mm , abdomen length 3.50, total body length 7.95 mm and V-shaped of fovea, scutela triangle and large with long thin legs femur I have two row of spines then spineless are in IV femur , coloration is yello
... Show More......
The Iraqi government seeks to overcome the financial crisis by investing and privatizing some projects to achieve sustainable growth. Most of the investment projects in Iraq suffer from many constraints that greatly impact the success of these projects. A survey of the opinions of a group of experts was conducted to identify the most important constraints facing the investment process in Iraq. Then the experts' answers were arranged in a closed questionnaire and distributed to the research sample for which the statistical analysis was conducted. Through it, the most important (17) factors that had the greatest impact on the failure of investment projects in Iraq were reached. One of the main constraints was
... Show MoreThe purpose of this article is to introduce reverse engineering procedure (REP). It can achieved by developing an industrial mechanical product that had no design schemes throughout the 3D-Scanners. The aim of getting a geometric CAD model from 3D scanner is to present physical model. Generally, this used in specific applications, like commercial plan and manufacturing tasks. Having a digital data as stereolithography (STL) format. Converting the point cloud be can developed as a work in programming by producing triangles between focuses, a procedure known as triangulation. Then it could be easy to manufacture parts unknown documentation and transferred the information to CNC-machines. In this work, modification was proposed and used in RE
... Show More