أثر تنوع الرؤى الاخراجية للاتجاهات والحركات المسرحية المعاصرة في أتساعالاشتراطات الجمالية لبنية الخطاب المسرحي + الامر الذي ادى الى انزياح مكوناتالعرض وعناصره ؛ ومنها المنظومة السردية للنص التي شكلت في بدايات المسرحجغرافية العرض المسرحي والمرتكز النظري والفكري الذي يمد العرض المسرحي أغلبتدفقه الجمالي وعنصر أستعلائي لعناصر العرض الاخرى ؛ وضمن التطورات اللاحقةأنسحب المخرج المسرحي من سطوة البنية النصية الى مدايات أكثر عمقا وأكثر كثافةجمالية ؛ بذلك تشكل مفهوم جديد يدعى " المعالجة النصية " وبتعدد الاتجاهات أصبح كلأتجاه يسعى الى معالجة خاصة للمكون النصي + وهذه الدراسة تتخذ الرؤية الاخراجيةلمسرح الصورة و ومعالجته للمدوّن النصي لا سيما ان مسرح الصورة يحاول تبني قيمجمالية خاصة بالتشكيل الصوري لخطاب العرض المسرحي بما يتجانس مع لغة المسرحالمعاصرة ؛ وقد تضمنت الدراسة الحالية الاطار المنهجي الذي احتوى على : (مشكلةالبحث ؛ وهدف البحث ؛ وحدوده ) 0 كما تضمن البحث أطارا نظريا شمل مبحثين ٠المبحث الاول :(معالجة النص في الاتجاهات المسرحية المعاصرة )والمبحث الثاني :(الأنشاء الصوري في مسرح الصورة) ؛ فضلا عن المؤشرات التي اسفر عنها الاطارالنظري ءوتضمن البحث اجراءات البحث مبينا فيه مبررات اختيار عينة البحث ؛ ومن ثمقيام الباحث بتحليل(عينة البحث ) من العروض التي قدمها مسرح الصورة للمخرج(صلاح القصب) مسرحية (مكبث ) ؛ وصولا لنتائج البحث التي شملت الابعاد الجماليةللرؤية الاخراجية لمسرح الصورة في معالجته للنص الدرامي ؛ ومن ثم يختم البحثبقائمة المصادر ؛ وملخص باللغة الانكليزية
Terrorism is a global phenomenon that engulfs most regions of the world to varying degrees. Media outlets are aware of the many incidents of violence and terrorism that have increased in recent times. The differences between the size of the phenomenon in different societies are the causes and severity of the phenomenon. On the role of local satellite channels in shaping the knowledge and trends of the Iraqi public towards the events of terrorism, in light of the assumptions of reliance on the media. The importance of this study is that it assesses the role of local satellite channels in the formation of knowledge and trends The study seeks to know the extent of exposure of the Iraqi public to local satellite channels, and to reveal the e
... Show MoreThis research sheds light on those discrepancies in the use of ornaments, adornment and perfumes, as well as the art of cosmetics, in two important civilizations, namely, the Mesopotamian civilization as the earlier civilization, and the civilization of Yemen, which represents the first Arab civilization. Through the foregoing, our research includes two topics, the first topic included the history of the use of decorations, ornaments and perfumes in the civilization of Mesopotamia, while the second topic included the study of ornaments, adornment and cosmetic art in the ancient civilization of Yemen. And then the research came out with a number of conclusions that the researcher considers very important to highlight the differences and f
... Show MoreThe Arabic pronouns received a lot of attention from the ancient Arab grammarians, so they explained their origins, the different forms of their structure, and the aspects of the Arabs’ use of them, and explained the aspects and reasons for these uses, with what they had of linguistic insight, which guided them to clarify the truth of these pronouns.
And recently, this research seeks new knowledge of the development of the structure of the nominative pronouns (he), (she), (them), (taa), and (waw) between dialects and towards classical Arabic, by analyzing the structure of these pronouns into their components. Its linguistic formulas are traced from the ancient Arabic texts, and by ancient I mean the texts of the era of linguistic ci
The huge amount of documents in the internet led to the rapid need of text classification (TC). TC is used to organize these text documents. In this research paper, a new model is based on Extreme Machine learning (EML) is used. The proposed model consists of many phases including: preprocessing, feature extraction, Multiple Linear Regression (MLR) and ELM. The basic idea of the proposed model is built upon the calculation of feature weights by using MLR. These feature weights with the extracted features introduced as an input to the ELM that produced weighted Extreme Learning Machine (WELM). The results showed a great competence of the proposed WELM compared to the ELM.
Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreThe messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreExchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show More