Preferred Language
Articles
/
Sxcm140BVTCNdQwCpCZS
The directorial vision of the theatrical text In the concept of a picture theater
...Show More Authors

أثر تنوع الرؤى الاخراجية للاتجاهات والحركات المسرحية المعاصرة في أتساعالاشتراطات الجمالية لبنية الخطاب المسرحي + الامر الذي ادى الى انزياح مكوناتالعرض وعناصره ؛ ومنها المنظومة السردية للنص التي شكلت في بدايات المسرحجغرافية العرض المسرحي والمرتكز النظري والفكري الذي يمد العرض المسرحي أغلبتدفقه الجمالي وعنصر أستعلائي لعناصر العرض الاخرى ؛ وضمن التطورات اللاحقةأنسحب المخرج المسرحي من سطوة البنية النصية الى مدايات أكثر عمقا وأكثر كثافةجمالية ؛ بذلك تشكل مفهوم جديد يدعى " المعالجة النصية " وبتعدد الاتجاهات أصبح كلأتجاه يسعى الى معالجة خاصة للمكون النصي + وهذه الدراسة تتخذ الرؤية الاخراجيةلمسرح الصورة و ومعالجته للمدوّن النصي لا سيما ان مسرح الصورة يحاول تبني قيمجمالية خاصة بالتشكيل الصوري لخطاب العرض المسرحي بما يتجانس مع لغة المسرحالمعاصرة ؛ وقد تضمنت الدراسة الحالية الاطار المنهجي الذي احتوى على : (مشكلةالبحث ؛ وهدف البحث ؛ وحدوده ) 0 كما تضمن البحث أطارا نظريا شمل مبحثين ‎٠‏‏المبحث الاول :(معالجة النص في الاتجاهات المسرحية المعاصرة )والمبحث الثاني :(الأنشاء الصوري في مسرح الصورة) ؛ فضلا عن المؤشرات التي اسفر عنها الاطارالنظري ءوتضمن البحث اجراءات البحث مبينا فيه مبررات اختيار عينة البحث ؛ ومن ثمقيام الباحث بتحليل(عينة البحث ) من العروض التي قدمها مسرح الصورة للمخرج(صلاح القصب) مسرحية (مكبث ) ؛ وصولا لنتائج البحث التي شملت الابعاد الجماليةللرؤية الاخراجية لمسرح الصورة في معالجته للنص الدرامي ؛ ومن ثم يختم البحثبقائمة المصادر ؛ وملخص باللغة الانكليزية

View Publication
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Feb 21 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of Re-engineering Business Processes in Continuous Improvement: Exploratory Statement of The Views of a Sample of The Faculties in The Law, Administration and Economy- University of Baghdad
...Show More Authors

The present study aimed to investigate the effect of re-operations engineering business in continuous improvement, as the rapid development of service activities generally private and the great diversity in the goals of its operations and programs of the university and the service has led to the increasing importance of re-operations engineering business as well as continuous improvement so began to study the relationship between the re engineering and continuous improvement of university service, and applied study on a sample of professors from the faculties of administration, economics and law. Find and reach to several conclusions, notably that the preparation of the teaching staff training sessions on how to use modern teaching

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
Time in the Cinema...The Two Films (The Knife and The Deceived) -A Model: كريمة ناوي
...Show More Authors

This study deals with the time property in the cinema through two films: (The Knife) directed by Khalid Hamada and (The Deceived) directed by Tawfiq Saleh. These two films were excerpted by the cinema from two novels of the Palestinian writer Ghassan Kanafani, the first is from the novel (What is Left for You) and the second is from the novel (Men in the Sun).  If the Palestinian novel has imposed its presence on the Arab creative scene through a group of novelists who took it upon themselves to communicate their cause to the world,   the Palestinian cinema has been far from being a purely Palestinian, because many of the cinematic works have been provided by Arab countries on the issue, while this cinema is still seeking

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
The Construction of a National Identification in the Novel of N. Scott Momaday House Made of Dawn
...Show More Authors

The United States government allowed Native Americans to abandon their reservations in the 1950s and 1960s. The historical, social, and cultural backgrounds shaped the forms and themes of works by American Indian writers who urged people to refuse their culture's sense of shame. Moreover, their behavior corresponded with the restoration of individuals to their rituals after disappointment, loss of sense of life, and mental illness performed from the influence of mainstream American society. Among these writers, N. Scott Momaday and Leslie Marmon Silko participate in similar interest in portraying characters caught between indigenous beliefs and white mainstream standards.  

      The construction of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
The Use of English as Lingua Franca in the Classes of UKM: as A Case of Study
...Show More Authors

           English has for long been one of the most widely used media of communication globally, especially in the Malaysian universities. It has been termed as a Lingua Franca because it is shared with other languages which are considered first languages by different speakers. For this reason, English as a Lingua Franca (ELF) has attracted a number of researchers to investigate its variety via other languages in various communities. The objective of this paper is therefore to establish the strategies which are employing by the international students at the National University of Malaysia/ UniversitiKebangsaan Malaysia (UKM) as an example of one of the Malaysian universities; when they e

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 22 2026
Journal Name
Al–bahith Al–a'alami
The Role of Media Coverage of the Iraqi Satellite Channels in Shaping Public Attitudes towards Terrorism (a Field Study of a Sample of an Audience of the City of Baghdad)
...Show More Authors

Violence is one of the most serious threats facing societies because it affects their internal structure and threatens the security and stability of society. It is classified as one of the types of security crises that are emerging in Arab and Islamic societies in particular, and in most countries of the world in general.

The threat of this crisis is increasing. Terrorism is considered as one of the most serious aspects of that all the countries of the world, currently, suffer from. The terrorism has begun to penetrate deep into society in one way or another starting from the Second World War, which led to the emergence of leftist movements in Western Europe, Japan, France, Italy and other countries as a result of emerging ideas

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Diagnosis of the reality of marketing knowledge management"A survey of the views of a sample of telecom operatorsIn the city of Sulaymaniyah "
...Show More Authors

This research aimed to diagnose the perception based on Telecommunications of Iraq to the importance of activating knowledge management marketing in possession, as well as Indication of impediments to activate the management of marketing knowledge in the researched companies, also aimed to show the extent of the existence of significant differences in perception based on Telecommunications Iraqi importance of activating the management marketing knowledge in possession. To achieve the objectives of this research, the questionnaire was developed and distributed to a sample of telecommunications companies in the city of Sulaimaniya, was selected on the criterion according to the company's life in terms of seniority in the telecommunication

... Show More
View Publication Preview PDF
Crossref