Abstract
The image of the soldier, as a hero who sacrifices everything to defend his
country and values, is no longer depicted in modern drama. With two World Wars
and many regional wars and civil wars, the soldier becomes a victim, not a hero.
Authors present the character of the soldier as a man who suffers a lot as he is
victimized by his own government and its politics that forces him to be in such a
position. Dramatists express their views about race, oppression and war through
their characters, such as the character of the soldier, as in the two selected plays for
this research: The Hostage by Brendan Behan and A Soldier's Play by Charles
Fuller.
The Hostage depicts, through its events, the Irish oppression which makes
both the Irish and the English victims for this conflict. A Soldier's Play presents the
oppression which the blacks face daily in their society, a matter which creates
among them the oppressed and the oppressor.
An oppressed people demand that all their resources be put to the
service of liberating them, no matter what these resources are. Certainly art and
culture must be seen in such a light. Literature, as part of art is sometimes the
mirror of its society and people. Dramatists, in general, and Brendan Behan and
Charles Fuller, in particular, are aware of the value of the theatre as a tool for social
discussion, therefore; their characters no more assume limited quality, as they
assume a universal one.1
Berndan Behan's The Hostage, which lies in three acts, was first
presented by Theatre Workshop in 1958. It takes place in an old house in Dublin. It
is owned by Monsewer, an Englishman by birth, who is more fanatically Irish than
his entourage; Pat, who served with Monsewer in the civil war, is no longer fanatic.
The other day in the Holy Quran and the four Gospels
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThe aim of this study is to identify the effect of enabling the effectiveness of the work of the audit committees in private commercial banks and to identify the extent of awareness of the importance of empowerment in the work of these committees, especially as it is known that these committees, especially the inspection committees that go to private banks and from various sources including committees of the Central Bank of Iraq Committees of the Securities Commission and finally committees of the external audit offices, through an analysis of the determinants of empowerment in the performance of the most important work of the audit committees, namely: supervising the process of preparing reports, supervising the system of intern
... Show MoreBackground/: Buccal tubes are orthodontic attachments used on the posterior teeth instead of bands, so it is important to focus on the effect of their properties on orthodontic treatment. The aims of the present in vitro study are to evaluate and compare the buccal tube front and back openings dimensions and the torsional play angle of six different brands. Materials and Methods: The samples consisted of Single bondable, non-convertible first molar buccal tubes from six brands supplied from six companies (Dentaurum, Forestadent, Ormco, 3M, American Orthodontic, A-Star). Regarding tube opening dimension, ten buccal tubes of each brand were examined by an optical microscope. Each tube was fixed during examination using synthetic mud and orie
... Show MoreResearchers used different methods such as image processing and machine learning techniques in addition to medical instruments such as Placido disc, Keratoscopy, Pentacam;to help diagnosing variety of diseases that affect the eye. Our paper aims to detect one of these diseases that affect the cornea, which is Keratoconus. This is done by using image processing techniques and pattern classification methods. Pentacam is the device that is used to detect the cornea’s health; it provides four maps that can distinguish the changes on the surface of the cornea which can be used for Keratoconus detection. In this study, sixteen features were extracted from the four refractive maps along with five readings from the Pentacam software. The
... Show MoreFG Mohammed, HM Al-Dabbas, Science International, 2018 - Cited by 2
A New Perspective About Masculinity and the Issue of Identity in Ernest Hemingway's The Old Man and The Sea and Michael Ondaatje's in The Skin of a lion
Image quality has been estimated and predicted using the signal to noise ratio (SNR). The purpose of this study is to investigate the relationships between body mass index (BMI) and SNR measurements in PET imaging using patient studies with liver cancer. Three groups of 59 patients (24 males and 35 females) were divided according to BMI. After intravenous injection of 0.1 mCi of 18F-FDG per kilogram of body weight, PET emission scans were acquired for (1, 1.5, and 3) min/bed position according to the weight of patient. Because liver is an organ of homogenous metabolism, five region of interest (ROI) were made at the same location, five successive slices of the PET/CT scans to determine the mean uptake (signal) values and its standard deviat
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More