Harold Pinter’s The Caretaker(1959) clearly portrays a lack of communication among the characters of the play which refers to the condition of modern man. This failure of communication led Harold Pinter to use a lot of pauses and silences in all the plays he wrote instead of words. Samuel Beckett preceded Pinter in doing so in his plays and one way to express the bewilderment of modern man during the 20th century is through the use of no language in the dramatic works. Language is no more important to modern man; instead, he uses silence to express his feelings. Silence is more powerful than the words themselves. That’s why long and short pauses can be seen throughout all Pinter’s plays.
In this play, th
... Show MoreModern critical theories revealed polemical views about the reality of the existence of communication - as a necessity for building a deliberative discourse - in the theater or not. To the theory of communication with all the conditions it imposes on thinking, interaction, and emancipation of selves in different contexts.
Therefore, the current research included four chapters, the first chapter dealt with the research problem, which was represented in (the philosophy of sensory and physical communication in theatrical performance), and the first chapter included the importance of the research, its goal and its limits, and ended with defining the terminology, and the second chapter included (theoretical framework) the first topic (ph
With the advancement of technology ,the study of cross-cultural communication via on line has become an important and researchable topic in linguistic theory and its applications.The aims of this study are two- fold (a) exploring the influence of cultural diversity on on-line interaction between American native speakers (NSs) and Iraqi non-native speakers (NNSs) of English which, together with other factors might potentially lead to what Thomas(1983) calls "pragmatic failure" (PF), a main cause of communication breakdowns and (b) specifying which type of PF occurs more frequently between the two groups along with the reasons behind such failures. To achie
... Show More<p>The popularity, great influence and huge importance made wireless indoor localization has a unique touch, as well its wide successful on positioning and tracking systems for both human and assists also contributing to take the lead from outdoor systems in the scope of the recent research works. In this work, we will attempt to provide a survey of the existing indoor positioning solutions and attempt to classify different its techniques and systems. Five typical location predication approaches (triangulation, fingerprinting, proximity, vision analysis and trilateration) are considered here in order to analysis and provide the reader a review of the recent advances in wireless indoor localization techniques and systems to hav
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreThe employment of cognitive radio (CR) is critical to the successful development of wireless communications. In this field, especially when using the multiple input multiple output (MIMO) antenna technology, energy consumption is critical. If the principal user (PU) is present, developers can utilize the energy detecting approach to tell. The researchers employed two distinct phases to conduct their research: the intense and accurate sensing stages. After the furious sensing step was completed, the PU user was identified as having a maximum or minimal energy channel. There are two situations in which the proposed algorithm's performance is tested: channels for fading AWGN and Rayleigh. When the proposed methods' simulation results a
... Show MoreInternet paths sharing the same congested link can be identified using several shared congestion detection techniques. The new detection technique which is proposed in this paper depends on the previous novel technique (delay correlation with wavelet denoising (DCW) with new denoising method called Discrete Multiwavelet Transform (DMWT) as signal denoising to separate between queuing delay caused by network congestion and delay caused by various other delay variations. The new detection technique provides faster convergence (3 to 5 seconds less than previous novel technique) while using fewer probe packets approximately half numbers than the previous novel technique, so it will reduce the overload on the network caused by probe packets.
... Show MoreOptimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the Random Waypoint model (RWP), Random Direction model (RD), Nomadic Co
... Show More