The current research deals with the argument of delusion and interpretation in the direction structure and its reflected impact in the reception activity and the amount of conceptual displacement it is subjected to in an aesthetic approach to abstract conceptual definitions of the reception activity , by the effect of this dialectic in the direction structure, which can be summed up by the following question: (What are the characteristics of the direction structure of the imaginary and what is the argument of interpretation in the theatre reception activity?) in order to stand on the aesthetic framework and conceptual definition of the direction structure in the controversy of interpretation and imagination, and its impact on the conceptual and procedural definition of the theatre reception activity, through monitoring the repercussions of this controversy of the direction structure in the theatre reception activity , which limited the research with a pivotal aim: (Showing the activity of the imagination and interpretation controversy and the direction structure of the visualizer, and monitoring its aesthetic impact on the theatre reception concept). The research comes up within the limits set forth in its methodological framework, to analyze the studied phenomenon in order to identify it, conceptualize it, and employ it procedurally. The research consists of three frameworks:
The methodological framework in which the researcher identified the problem of the research, its importance, the need for it, its purpose, and its limits, as well as defining its terms procedurally.
The theoretical framework is of two axes: the first is the axis of the argument of delusion and interpretation in the direction structure, and the second axis is the controversy of delusion and interpretation in the theatre reception.
The procedural framework included the researcher's procedures in applying the theoretical framework indicators to his chosen sample, namely the play "Mukashafat" (confessions) to monitor the conceptual effect of the controversy of interpretation and delusion in the direction structure, on the theatre reception concept. The research came up with a number of conclusions, the most important of which are: the theatre reception is a controversial act, in which the debate moved towards the activity of delusion and its criterion is the achievement of the assumption, and the activity of interpretation and its criterion is the achievement of the discovery.
The reason for my choice of the topic (what Imam Al-Tirmidhi mentioned in his book Al-Sunan regarding the provisions of sales) is that he mentioned many topics that affect people's lives, which are represented by commercial transactions and the exchange of benefits between them, so it became clear to them what is forbidden and what is not, aiming not to fall into the prohibited, and to achieve their interests, and relieve them of embarrassment. What we will see in the research.
Background: The size of the nasopharyngeal airway was believed to have an important role in the development of the dentofacial structure. This study was carried out to test the relation between the nasopharyngeal dimensions with some dento-cranial measurements in class I and II jaw relationship. Materials and Methods: This study was done on 60 subjects (30 males and 30 females) at age range 18-25 years. Cephalometric radiograph has been taken to each subject and the measurements were recorded. The sample was divided into two groups, class I skeletal relationship (15 males and 15 females) and class II skeletal relationship (15 males and 15 females). Comparisons between the different study groups were undertaken. Results: In class I skeletal
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The study was conducted at research station A, department of field crops, college of agricultural engineering sciences, university of Baghdad during summer 2021 to evaluate the effect of boron and some growth regulators on some growth criteria and yield of soybean crop (cv. shimaa). The experiment was carried out according to split plots by using randomized complete block design with three replications. The main plots included three concentrations of boron (75, 150 and 225) mg.L-1, the sub-plots included three levels of growth regulators, spraying kinetin (100 mg. L-1), spraying ethrel (200 mg.L-1) and spraying kinetin (100 mg.L-1) + spraying ethrel (200 mg.L-1) as
... Show Morechronic obstructive pulmonary disease (COPD) is a common respiratory disease with episodes of exacerbation. Variable factors including infectious pathogen can predispose for this exacerbation. The aim of this study is to evaluate the role of intestinal protozoa in COPD exacerbation. A total of 56 patients with COPD were included in this study. Patients were categorized into two groups based on the frequency of exacerbation during the last 6 months: those with ≤1 exacerbation (32 patients) and those with ≥2 exacerbations (24 patients). Stool specimens from each patient were collected two times (one week interval) examined for intestinal parasite. In univariate analysis, rural residence and parasitic infection were more common among patie
... Show MoreAlthough there are many wastewater treatment plants, we still suffer from many problems resulting from a lack of experience or technical operating problems. In this research, the service’s efficiency is evaluated according to the design laws required for small factories in the province of Najaf, which works with filtering technology through point filtration, the old project in the Al-Baraka plant, and the second works. Within the biological treatment mbbr + activated sludge, which is a biomass technology where samples were taken from both plants and annual values of the pollutant rate after treatment in the old Al-Baraka plant project COD 64 mg/L and the demand for biochemical oxyge
Public-private partnership (PPP) has been used over the past 20-30 years by governments in developed countries to meet the public demand for infrastructural services. In Iraq, the PPP concept is comparatively new to the Government of Iraq (GoI), where the government has historically taken most of the responsibility for providing public services. There are few PPP projects in Iraq. However, the number is increasing. Recently the Iraqi market has experienced a number of attempts of PPP in different sectors, especially after the new investment law in 2006. The aim of this paper is to evaluate the investment environment in Iraq and to indicate the main factors affecting PPP in particular for infrastructure projects. Some literature review and
... Show MoreThe research aims to find ways to minimize the use of quantities of chemical fertilizers in agriculture in order to get to an environment that is free of contaminants. Magnetized water technology used in the experience of planting seeds of tomatoes Thomson type to obtain a higher efficiency to absorb fertilizer NRK in the protected environment of the period from February to June. Magnetized water system used locally made levels Gaues (4800,2500,1500) concentrations of 50 to 100% for each level and the rate of (4) replicates, and results indicated that the severity of the magnet (4800 Gaues) and a concentration of 50% gave the highest percentage of tomato fruit size and intensity ( 1500 Gaues) and a concentration of 100% did not give any inc
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreThis research was carried out in quail in the laboratory of histopathology diseases during four months. The objectives of this study was to detecting the effects of the addition of the alcohol extract of ginger to ovary tissue of quail. The two groups of birds were in almost similar weights and were placed in cages. Each group consisted of 8 quails. The first group (control group) fed on regular feeding without adding alcoholic extract of ginger. The second group (treated group) fed on the same normal food after adding the alcohol extract of ginger at a concentration of 300 mg / kg. The results indicated that ginger have positive effects on folliculogenesis.