The theatrical image represents one of the tools of communication with the other to create a communicative language that is produced and transmitted by the actor and his body through the theatrical space to convey the meaning in all its forms and types. The actor is concerned with the composition and construction of these images. My girl, the image is fragmented and multiple and different. Therefore, based on the foregoing, the researcher has divided his research into four chapters, representing the (methodological framework). First, the research problem, which is manifested in the following question (what is the structure of the fragmented image of the actor's performance? The Iraqi playwright), and secondly: the importance of the research, the need, the goal of the research, the limits of the research, and (theoretical framework) with two sections that included the first topic: the composition of the theatrical image / while the second topic came: the fragmented image of the performance of the Iraqi theatrical actor) and concluded with the indicators that resulted from the theoretical framework. The (research procedures) included an analysis of the research sample chosen by the researcher intentionally, which is represented by the play (Ahriman), while (results, discussion and conclusions), a set of results emerged that the researcher came out with:
1. The show activated the synthetic and intellectual image according to fixed and variable connotations that worked on broadcasting a set of functions by means of metaphor for the vocabulary through new symbols that can be interpreted, achieved by the performative act of the actor, while highlighting the functioning and moving of the meaning and its messages.
The aim of the research is to use the data content analysis technique (DEA) in evaluating the efficiency of the performance of the eight branches of the General Tax Authority, located in Baghdad, represented by Karrada, Karkh parties, Karkh Center, Dora, Bayaa, Kadhimiya, New Baghdad, Rusafa according to the determination of the inputs represented by the number of non-accountable taxpayers and according to the categories professions and commercial business, deduction, transfer of property ownership, real estate and tenders, In addition to determining the outputs according to the checklist that contains nine dimensions to assess the efficiency of the performance of the investigated branches by investing their available resources T
... Show MoreRecently, environmental noise has arisen from various sources, such as those from exhaust mufflers of combustion engines found in cars, trucks, or power generators, which produce significant noise during their operation. Controlling the radiated noise from these mufflers is a major factor in improving acoustic comfort and minimizing the impact on the surrounding communities. Numerous research has been presented for this reason by modification of the internal structure of the exhaust muffler. The main objective of this work is to reduce the noise level emitted from exhaust mufflers. This can be achieved by adjusting structure parameters to attenuate the surrounding environment's radiated noise. Analysis of pressure-wave propagation h
... Show MoreThe present study reports the effect of temperature and liquid hourly space velocity (LHSV) on the cumene cracking reaction rate and selectivity by using a laboratory continuous flow unit with fixed bed reactor operating at atmospheric pressure. The prepared HX zeolite was made from Iraqi kaolin with good crystallinity .The activity and selectivity of prepared HX-zeolite was compared with standard HY zeolite and HX zeolite catalysts in the temperature range of 673-823K and LHSV of 0.7-2.5 h-1 . It was found that the cumene conversion increases with increasing temperature and decreasing LHSV at 823K and LHSV of 0.7 h-1 the conversions 65.32, 42.88 and 59.42 mol% for HY, HX and prepared HX catalysts respectively and at LHSV of 2.5 h-1 and th
... Show MoreThe global rise in temperature and the desert climatic conditions prevalent in Middle Eastern countries have exacerbated rutting distress in heavily trafficked highways. Conventional asphalt binders with a high-temperature performance grade (PG 70) have proven inadequate under such extreme conditions, necessitating the development of modified binders with enhanced high-temperature performance. While polymer modification using styrene-butadiene-styrene (SBS), an elastomeric polymer, and ethylene-vinyl acetate (EVA), a plastomeric polymer, has been widely studied, limited research provides a direct comparison of their effectiveness at both the binder and mixture levels under extremely high-temperature conditions. This study addresses this gap
... Show MoreDBN Rashid, IMPAT: International Journal of Research in Humanities, Arts, and Literature, 2016 - Cited by 5
The novel was generally distinguished from other literary arts in its connection with the living reality as an imaginative practice that relies on political, economic, social, intellectual and cultural references and as a crucial tool in reading cultural references and dive deep into reality. As every novelist has a vision to embody this reality. As every novelist has a vision to embody this reality. The novel of ("Exceeded border by Hammed Al-Kafa’i) is a considered a fertile field for presenting social issues in their apparent structure and revealing the cultural patterns behind them which lies in its deep structure. The novel here moves its characters in its imaginary world in a way that it becomes more capable of adaptation and crysta
... Show MoreActing on the Holy Qur’an by contemplating its meanings, stopping at its commands and prohibitions, and everything in it that guides us to truth and mercy. The Holy Qur’an includes it for various purposes in one verse, and there is no doubt that this is part of the perfection of this great book, and one of the sciences of the fundamentalists is the indication of the context, and it is a great science of high rank, and it is one of the most important things that lead to the correct understanding of the miraculous and decisive book of God Almighty, and one of the best meanings of the Qur’an It was not from the context of the verses, and from here it can be said that the indication of the context is one of the origins of deriving lega
... Show MoreThis research Sought to identify the correlation relationships and the impact of each of the job description and perceived organizational support, Excellent Job performance of the heads of academic departments in the faculties of the University of Sulaymaniyah Iraqi Kurdistan Region, totaling (89) as President, and to achieve this was Default plan includes research variables as well as the formulation of a number of preparation fundamental assumptions, and researchers used a questionnaire for this purpose as a tool head of the collection of data and information, as it was distributed (80) copies, and the number of retrieved them (76) a copy of a valid statistical analysis, as well as conducting personal i
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More