Preferred Language
Articles
/
jcofarts-1354
Medea Euripides between text and contemporary theatrical presentation
...Show More Authors

It is not available for us to go back in time and see plays old and it plays giants tragedy ancient Greek (Aeschylus, Sofokls, and yourbedes) through the eyes of a generation ago, and if we were able to go back to Ntegathm play it is certain that we will not taste or Nstassig for much of what we see from these offers will not afford the traditional religious rituals, which was accompanied also dance and music in the style of ancient Greek play was representing a large part of the theater see manifestations Can our eyes and ears we twentieth century audience to accept those appearances, and it was then?
Inevitably it will look like a museum bycollection not only. So we find ourselves in the light of the foregoing forced When you do remove it that werenew and wewear dress contemporary without limit ourselves to re-display alone, taking into consideration a bridge between past and present to build this bridge by creating a unit harmony between the theatrical old as it was in its time and it must be in our time approaching taste Mtafrjna the contemporary The essence of this association can achieve the following:
- The goal of the author. Any content and ideas that envisaged broadcast to the public.
- Appropriate theater to the taste of the contemporary theater audience.
Perhaps one of the a priori what humility him interested and scholars to bring theater to be on top of what operating theater director that hurt his excretory in the service of the text of theater and its audience, as it is not plays prototype is Square Stadium reviewing the talents of the director, has no right to change the meaning or philosophy matched or a sense of meaning, but what permitted him play and meaning.
And according to this vision, the director d. Adel Karim provide a range plays heritage of ancient Greek without being sidetracked in his directorial contemporary purpose and philosophy of the play, but tried hard to maintain a secretary's speech Author drama, and documents the link between the text as it was (except for some of the measures which he found necessary to promote and achieve his experience) and between a bystander local taste. Introduced some of the plays poet, playwright Sofokls (Antekohna, Electra, Oedipus king) and some another was awarded to playwright Iorbidha who was representing the third side of the triangle tragic Greek (Aeschylus, Sofokls, and yourbedes) selected him play (Media) and highlighting them in his research that model of an applied for this type of plays Greek submitted by seeing getmeout contemporary and forward-looking to the reality of welcome and Piazza put more comprehensive issues of modern man, what carries this play (which represents a model of models of theatrical social) ability to openness towards one of the problems of our time so that the events and attitudes that passed out (Media - Women) Greek, is what can be faced by women in our current way or another, where the content of the play reveals the point of consider ethical yourbedes and position of the misery of the social status of Greek women in the ancient Greek era

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The relationship between Iraq's foreign trade and economic growth analysis For the period (2013-1980)
...Show More Authors

Abstract

This study highlights the importance of Iraq in the analysis of foreign trade and economic growth for the period (1980 - 2013) is an attempt to determine the equilibrium relationship long term and short term between these two variables were used ARDL model to explain the economic relationship between the two variables.

To achieve the objectives of the research has been the standard model estimate after testing the stability of exports X data series, and imports M, and GDP current prices, and exchange rate EXR, and verify the existence of a joint integration relationship between these variables.

In order to achieve the objectives of the research it

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jan 06 2021
Journal Name
Journal Of Planner And Development
Environmental dimensions and administrative mechanisms for the territory planning in Algeria, between theory and reality.
...Show More Authors

     In front of the serious deterioration of the elements of the environment, new convictions arose the need to integrate into the global environmental concerns as being one and the issue of shared responsibility and the impact of this conviction, the evolution of the environment protection law in many countries, including Algeria. Due to the multiplicity of perceptions about the environmental result of multiple scientific disciplines, the legislative concept emerged to protect the environment, which includes prevention and rational management and conservation and restoration and repair.

    Environmental planning for the various governments and countries aims to avert disasters and achieve the

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of The College Of Languages (jcl)
Linguistic contast between bilateral and trilateral roots in Semitics languages (Arabic and Syriac as a model)
...Show More Authors

The present study investigates the relation between the biliteral and triliteral roots which is the introduction to comprehend the nature of the Semitic roots during its early stage of development being unconfirmed to a single pattern. The present research is not meant to decide on the question of the biliteral roots in the Semitic languages, rather it is meant to confirm the predominance of the triliteral roots on these languages which refers, partially, to analogy adopted by the majority of linguists. This tendency is frequently seen in the languages which incline to over generalize the triliteral phenomenon, i. e., to transfer the biliteral roots to the triliteral room, that is, to subject it to the predominant pattern regarding the r

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Relationship Between Blood Types And The Kind Of Food Intake And Its Impact on Human Health
...Show More Authors

This Study aimed To know The relation between Types of blood and health problems which human Suffered from , and the effect of food intake on health.
Samples of study contained 269 person aged between 30 – 70 years which choiced randomly for sex , we are take all in formation about samples of study by form paper contian sex , age, type of blood , weight (kg) , height (cm) , smoking or.not , sporting or not, problems in digestive tract , sensitivity for foods , heart problems , ratio of cholesterol in blood , Sinusitis , Asthma , diabetic meliuts , arritable bowel syndrome , diaherra , problems in kidney and urination , hypertension , anemia , alternation in liver function , arthritis with form record in daily food intake and its ade

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 21 2017
Journal Name
Lecture Notes In Computer Science
Emotion Recognition in Text Using PPM
...Show More Authors

In this paper we investigate the automatic recognition of emotion in text. We propose a new method for emotion recognition based on the PPM (PPM is short for Prediction by Partial Matching) character-based text compression scheme in order to recognize Ekman’s six basic emotions (Anger, Disgust, Fear, Happiness, Sadness, Surprise). Experimental results with three datasets show that the new method is very effective when compared with traditional word-based text classification methods. We have also found that our method works best if the sizes of text in all classes used for training are similar, and that performance significantly improves with increased data.

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Ruling on questioning children by the security authorities: (Comparative Study between Sharia and Law)
...Show More Authors

Some of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law

View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Medical evidence in matters of proof between Sharia and law: A model
...Show More Authors

Praise be to God, prayer, and peace be upon the Messenger of Allah and his God and his companions. The field of the judiciary to prove or invalidate some cases in the field of proof of descent and attachment to the plaintiff or exile, and other legal and judicial issues, especially in this era where the spread of previously unknown evidence, such as DNA, which was discovered in 1953, and the genetic fingerprint discovered 1984, blood analysis and a Saliva, sweat, poetry, etc. in the field of forensic evidence, in forensic medicine or medical expertise, it can be used to identify the killer, or verify his identity, using all the evidence in the scene, such as a point of blood or sweat, and the like So, as well as to prove the lineage is u

... Show More
View Publication Preview PDF