It is not available for us to go back in time and see plays old and it plays giants tragedy ancient Greek (Aeschylus, Sofokls, and yourbedes) through the eyes of a generation ago, and if we were able to go back to Ntegathm play it is certain that we will not taste or Nstassig for much of what we see from these offers will not afford the traditional religious rituals, which was accompanied also dance and music in the style of ancient Greek play was representing a large part of the theater see manifestations Can our eyes and ears we twentieth century audience to accept those appearances, and it was then?
Inevitably it will look like a museum bycollection not only. So we find ourselves in the light of the foregoing forced When you do rem
The current research consists of four chapters, the first chapter of which is devoted to presenting the research problem, its importance, purpose and limitations as well as a definition of its terms, as the research was limited to knowing the effect of plant decoration in the Kufic script, while the second chapter included the theoretical framework of the research, which consisted of two topics, one of which is the plant decoration, The second relates to the Kufic script and the stages of its formation, development, and intonation. The third chapter includes the research methodology and mechanisms for analyzing the linear panels. The fourth chapter, during which the most important findings of the researcher were presented, are as follows
... Show MoreThe current research aims to know the relationship between bullying and parental treatment. (200) pupils were selected randomly from the fifth and sixth grades of primary schools.
Two instruments were used. The first was to measure bullying and it included 19 items. To measure parental treatment, the researchers adopted (Aletaby 2001) scale.
Statistical analysis showed that correlation between bullying , wiggle and Firm treatment style was positive Statistically significant .Bulling was correlated negatively with (neglect, careless, and Authoritarian treatment style.
SAGD is a thermal recovery process in which steam oil ratio, SOR, is a key parameter that can affect the economic outcome of the process. Reservoirs with underlying or overlying lean bitumen present challenges for SAGD as they can act as a heat sink. Water has higher heat capacity than the bitumen and thus requires more steam to heat up the reservoir leading to higher SOR. The potential outcome of operating SAGD in these conditions may be lower bitumen rate and higher steam injection rate, both of which affect plant throughput and thus the economic matrix of SAGD. This paper looks at the performance of SAGD process in the presence of top lean bitumen. It will examine the theoretical CSOR that is needed to produce the bitumen with different
... Show MoreDry gas is considered one of the most environmentally friendly sources of energy. As a result, developing an efficient strategy for storing this gas has become essential. In this work, MOF-199 was synthesized and characterized in order to investigate the MOF-199 in dry gas adsorption using a built-in volumetric system (methane, ethane, and propane from Basrah gas company). The MOF-199 (metal organic framework) was synthesized using the solvothermal method at 373K for 24h, and then it was characterized. The dry gas adsorption on MOF-199 was studied under various conditions (adsorbent dosage, contact time, temperature, and pressure). The isothermal adsorption of the dry gas had been studied on MOF-199 using two types of mo
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreOver the past ten years, tumor markers have played an increasingly important role in clinicaloncology. This trend is expected to continue as technology advances and our knowledge of thehuman body and disease processes grows. In the treatment of cancer, tumor markers are widelyused for a variety of purposes, including screening, selecting a management strategy,determining the prognosis, and post-therapy follow-up. A comprehensive of the fundamentalsof pathophysiology and identification strategies for each specific malignancy is necessary fortheir prudent application in clinical practice. Oncology's use of cancer biomarkers hastransformed the way that cancer is treated, and led to notable improvements in patient outcomesand cancer tre
... Show Morehemorrhagic fever (VHF), one of which is Filoviridae. The Filoviridae family includes the Ebola virus , is responsible for the current VHF outbreak in West Africa. Viral hemorrhagic fevers (VHFs) occur in various regions around the world, yet traditional diagnostic testing for these diseases has typically been conducted in major reference laboratories located in Europe and the United States. In this review, we explore the current understanding of the mechanisms driving the pathogenesis of viral hemorrhagic fevers (VHFs) and examine the progress in developing preventive and therapeutic strategies for these infections.
This research provides a study of the virtual museums features and characteristics and contributes to the recognition of the diversity of visual presentation methods, as the virtual museums give the act of participation and visual communication with programs at an open time, so that it would contribute to reflection, thinking and recording notes, developing the actual and innovative skills through seeing the environments. The study has been divided into two sections the first one is virtual museum techniques. The techniques were studied to reach the public and are used remotely by the services of personal computers or smart phones being virtual libraries that store images and information that was formed and built in a digital way and how
... Show More