Violence occurs as a daily human action all over the world; it may cause so many kinds of damage to individuals as well as to society: physical, psychological, or both. Many literary authors of different genres have tried their best to portray violence by showing its negative effects, especially playwrights because they have the chance to show people the dangers of violence through performance on stage to warn them against such negatively affected action. It has been a human action since the beginning of human life on this planet when the first crime happened on earth when Cane killed his brother Abel. In our modern world, people are witnessing daily violent actions as a result of destructive wars that turned the humans into brutal beings. This paper deals with violence as it occurred as a result of the atrocities of wars in two different societies during the same period of the 1990s: A European country (probably Bosnia or Britain), as reflected in Sarah Kane’s Blasted (1995), and Iraqi, as shown by Ali Abdulnebi Al Zaidi’s Fourth Generation (1997). Although violence takes different shapes, still it has the same destructive effects on the life of people who are involved in. The researcher tries to show how both writers have staged violence during the performances of their plays.
The research entitled: (The Constructive Mutation of installation Systems in the Artworks of the artist Ali Al-Najar) has dealt with the concept of Mutation and its systematizations in installation in the artworks of (Ali Al-Najjar).
The research has four chapters: The first Chapter deals with the methodological framework represented by the basic problem of the research, that is concerned with the constructive mutation of installation systems.
The research aims at finding out the constructive mutation of installation systems in the artwork of ( Ali al-Najar). The research is limited by analyzing visual samples of (Ali Al-Najjar) artworks betwen (1967-1991)
The second chapter deals with the theoretical framework, it has five s
Acquisition provisions in Islamic jurisprudence
For poets to pay a great attention to the Islamic figures and their symbolism in Islam come as a prominent phenomenon in our literature . As there is an impact of them on the brilliant history commemorated by littérateurs . As a matter of fact ، the chronicle of Imam Ali Ibin Abi Talib (peace be upon him) falls in the orbit of the focus Ibn Abi Al-Hadid Al-Mu'tazili steers to in his poems . The current research study is to trace the portrayal of Imam Ali (peace be upon them) in the poetry of Ibn Abi Al-Hadid Al-Mu'tazili ، Seventh Alwiite Poems ، as there is no a study tacking such a conjecture before. In the article there are two axes : the introduction comes as first axis portraying Imam Ali Ibn Abi Talib (peace be upon him) in the wa
... Show Moreحسن السيد عز الدين بحر العلوم العقد الاجتماعي والسلطة الشعبية عند الإمام علي (عليه السلام )
The contextual clues researcher guide to determine the meaning of the word is likely to several meanings, was contextual clues Dalili in determining the meanings morphological acts whipped in a sermon Alhqhqih.
And meanings are endless on the contrary language words used to express these meanings, we find that one word may be used to express more than one meaning, leading to the phenomenon of semantic possibility.
So it was inevitable that contain language text on the signs designate the reader and listener and researcher to identify the intended meaning, and these signs are contextual clues in the text.
Actual formulas whipped features from other formulas morphological Pkthertha frequent use and the large number of meanings men
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
At the beginning of the twentieth century distorting handling totalitarian phenomena of art, which can be called the stage of the test, transition from the theory of ideal theory and other realistic is not cushy, since it requires vision and reading and other concepts, and in light of this dialectic manifested research problem by asking the following Is affected by the design idealism and realism. Through the above mentioned questions, the researcher found rationale for addressing this problem, the study through his research, which is marked (idealism and realism in a comparative study design). And demonstrated the importance of research in the identification of the concept and the effectiveness of the two theories idealism and realism a
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More