Abstract
The image of the soldier, as a hero who sacrifices everything to defend his
country and values, is no longer depicted in modern drama. With two World Wars
and many regional wars and civil wars, the soldier becomes a victim, not a hero.
Authors present the character of the soldier as a man who suffers a lot as he is
victimized by his own government and its politics that forces him to be in such a
position. Dramatists express their views about race, oppression and war through
their characters, such as the character of the soldier, as in the two selected plays for
this research: The Hostage by Brendan Behan and A Soldier's Play by Charles
Fuller.
The Hostage depicts, through its events, the Irish oppression which makes
both the Irish and the English victims for this conflict. A Soldier's Play presents the
oppression which the blacks face daily in their society, a matter which creates
among them the oppressed and the oppressor.
An oppressed people demand that all their resources be put to the
service of liberating them, no matter what these resources are. Certainly art and
culture must be seen in such a light. Literature, as part of art is sometimes the
mirror of its society and people. Dramatists, in general, and Brendan Behan and
Charles Fuller, in particular, are aware of the value of the theatre as a tool for social
discussion, therefore; their characters no more assume limited quality, as they
assume a universal one.1
Berndan Behan's The Hostage, which lies in three acts, was first
presented by Theatre Workshop in 1958. It takes place in an old house in Dublin. It
is owned by Monsewer, an Englishman by birth, who is more fanatically Irish than
his entourage; Pat, who served with Monsewer in the civil war, is no longer fanatic.
The research problem was to identify the impact of monetary policies on economic growth in the oil and non-oil countries. The researcher chose the Republic of Iraq as an example for the oil countries and the Arab Republic of Egypt as an example for the non-oil countries to hold a comparison on the impact of monetary policies.
The research found that the monetary policies and their tools in the Iraqi economy affect the rate of GDP growth by 73%, which shows the strong impact of monetary policies on the economic growth in the Iraqi economy as an example of an oil state. GDP growth rate of 61%, indicating the impact of monetary policies on economic growth in the
Besides the role of state institutions that come in the forefront of their priorities and obligations to provide security and development of the economy and reduce the unemployment rate and the reduction of inflation and improving education, health and others, the Community Partnership At frames what has become known as the institutions of society civil-with the state does not eliminate the role, but rather complements its role ; it is the role of civil society partner and an extension of the role of the state in the face of challenges and crises, but it may be sometimes a race role in addressing social, political and economic issues of the role played by the state, not complementary.
The highlighting the specificity of the relationsh
The concept of TQM is based on one of the concepts that combine administrative and innovative methods. The aim of the research is to demonstrate the dimensions of TQM in enhancing the satisfaction of the taxpayers through a survey of a sample of officials in the General Authority for Taxation and 50 officials. In the collection of data and information, and the results were analyzed using the SPSS program to find the most important compounds and factors in he method of analysis.
The research problem was represented by the non-application of the General Authority for Taxation to the entrances and modern practices in the administrative work. The results of some of the complications that accompany the tax accounting process, which af
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreThe last ten years observed a shift enormous scientific in the method and way that it deals professional with the cost accounting and reflected the result those shift enormous scientific of increase the competitive environmental that accompanied the emergence of a modern manufacturing environmental on surface the long roductive life and emergence advanced information technology that give a central focus of his important on client with growing global markets growth on a large scale.
The research aim to define the concept of cost awareness, the concept and methods of strategic cost management and the role of cost awareness for managers of industrial units in strategic of cost managem
... Show MoreAutorías: Mariam Liwa Abdel Fattah, Liqaa Abdullah Ali. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 4, 2023. Artículo de Revista en Dialnet.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe research problem stems from a chief question: “What is the nature of the responsibility that «Al-Sabah Al-Jadeed» and «Al-Mada» Newspapers have undertaken in promoting the values of citizenship and national belonging in the society? The research aims to achieve a number of goals, including: Determining the most prominent themes that were emphasized in the opinion articles in these two newspapers within the framework of the responsibility of promoting the values of citizenship and national belonging in society, and revealing the most prominent topics that were discussed in opinion articles in the two sample newspapers regarding the promotion of the mentioned values. This research is a desc
... Show MoreThe United States government allowed Native Americans to abandon their reservations in the 1950s and 1960s. The historical, social, and cultural backgrounds shaped the forms and themes of works by American Indian writers who urged people to refuse their culture's sense of shame. Moreover, their behavior corresponded with the restoration of individuals to their rituals after disappointment, loss of sense of life, and mental illness performed from the influence of mainstream American society. Among these writers, N. Scott Momaday and Leslie Marmon Silko participate in similar interest in portraying characters caught between indigenous beliefs and white mainstream standards.
The construction of
... Show More