The postmodern ideas and concepts have produced social, political and economic variables that have been affected by wars, crises, the role of globalization and the information revolution. They have created many variables in concepts and great variables in technological, artistic and cultural innovations. All these changes have contributed to changing the form of the theatrical show aesthetically and intellectually, which cast a shadow over the nature of the actor's performance who has become more demanding to change his performance and to find the mechanisms and new nature of work governing him corresponding to those variables and this prompted the researcher to adopt the subject (the performance variable of the actor's techniques in postmodern theatre show (. Research importance:It provides benefit to actors, directors and workers in the field of theater. The researcher in the theoretical framework tackled two sections:The first section: Postmodern conceptThe second section: the actor's performance in postmodernismThe researcher chose a sample for the analysis represented by the play (Azaiza), which was presented in 2014, and after the analysis, a set of results have been found and the most important of which are:- The theory of playing in the performance and performance technology clearly contributed to the blending of all the styles and artistic trends within one center that depends through their way on fragmentation, anarchy, contradiction, and the ambiguity and multiplicity of the meaning. Then the conclusions reached at and the most important of which are:-The performance variable of the actor's techniques is highlighted in postmodern presentations via subjugating the actor to the hegemony of the techniques that made him a sign subject to its authority within the show system.
The research titled (narrations of Imam Muhammad bin Ali al-Baqir (upon him be peace) about washing, in the four books of Sunan - study and analysis -) deals with what was reported from the noble and purified hadiths about him, peace be upon him, through the four hadith works represented by Sunan Abu Dawud (d. 275 AH). And Al-Jami’ Al-Kabir (Sunan Al-Tirmidhi) (d. 279 AH), Sunan Al-Nasa’i (Al-Mujtaba) (d. 303 AH), and Sunan Ibn Majah (d. 273 AH), who is the venerable imam and jurist from the House of Prophethood, as he transmitted many traces from the Prophet, may God bless him and grant him peace. Upon him and his family, peace be upon him. The study focused on his narrations, including the rulings on washing
Voice over Internet Protocol (VoIP) is important technology that’s rapidly growing in the wireless networks. The Quality of Service (QoS) and Capacity are two of the most important issues that still need to be researched on wireless VoIP. The main aim of this paper is to analysis the performance of the VoIP application in wireless networks, with respect to different transport layer protocols and audio codec. Two scenarios used in the simulation stage. In the first scenario VoIP with codec G.711 transmitted over User Datagram Protocol (UDP), Stream Control Transmission Protocol (SCTP), and Real-Time Transport Protocol (RTP). While, in the second scenario VoIP with codec G.726 transmitted over UDP, SCTP, and RTP protocols. Network simulator
... Show MoreIraqi EFL college instructors, who supervise the teaching practice of EFL student teachers, commonly experience the inefficient teaching performance of prospective teachers. This inefficiency is usually due to their inability to make connections between the practical experience and the theoretical knowledge of TEFL. One of the reasons behind this inability may be the employment of traditional ways of training and instructing student teachers. Moreover, it is usually noticed that many Iraqi EFL student teachers have a negative attitude toward the teaching profession. They explicitly state that they would join the teaching force only if they fail to work in any other field.
... Show MoreObjective: The aim of the research is to prepare skilled mental exercises according to spatial and temporal perceptions and the awareness of the strength of young pole-vaulters, and to recognize the impact of these exercises on improving the indicators of electrical activity of working muscles and some special physical abilities and accomplishing this effectiveness Research methodology: The researcher used the experimental curriculum (one experimental group), and included the sample of research on (5) two joint jumpers in the Iraqi club championship, all from the center of talent in athletics, the sample is trained on the same curriculum prepared by the coach himself but accompanied by a mental training approach that Prepared by the
... Show MoreIn light of the general inadequacy in the performance of the economic units operating in Iraq, and the contemporary developments in all the various sciences, Iraqi economic units have become obligated to use modern technologies applied around the world. Keeping abreast of these developments is done by moving away from traditional methods of evaluating performance and applying approved and accepted methods of evaluating performance. This will lead to an increase in the efficiency and effectiveness of the activities of economic units. In addition, this drives to reduce production costs. Accordingly, this study aims to clarify the application of the balanced scor
... Show MoreThe fact of having Journalism being open to people from different orientations professions, working as journalists requiring protection just to spread corruption, is one of the biggest threats faced by journalism.
Journalists noticed the spread of unprincipled journalists with no journalistic ethics amongst them, they tried to protect their profession from these corrupt outsiders who might annihilate the mighty of journalism. The principles of the journalism profession known as journalistic ethics, are one the most important formulations of the law concluded by the journalists and those concerned by the the profession, they were then published in public in order to prove their professionalism, especially for those who don’t und
... Show MoreObjective: To evaluate nurses' practices concerning isolation techniques for Adult Leukemic Patients (ALP).
Methodology: A descriptive study was carried out at the isolation rooms at leukemic wards in Baghdad Teaching
Hospitals, starting from Jan. 27th 2008 up to the 27th of Apr. 2008. To achieve the objectives of study, a non-probability
"purposive" sample of (50) nurse was selected out of four Teaching Hospitals in Baghdad city were selected according
to the criteria of the study sample.
The study instrument consisted of two major parts. It is based on the review of literature. First is concerned with
demographic data for nurses; and the second part is observational tool (checklist) is composed of (83) item. The conte
Many oil and gas processes, including oil recovery, oil transportation, and petroleum processing, are negatively impacted by the precipitation and deposition of asphaltene. Screening methods for determining the stability of asphaltenes in crude oil have been developed due to the high cost of remediating asphaltene deposition in crude oil production and processing. The colloidal instability index, the Asphaltene-resin ratio, the De Boer plot, and the modified colloidal instability index were used to predict the stability of asphaltene in crude oil in this study. The screening approaches were investigated in detail, as done for the experimental results obtained from them. The factors regulating the asphaltene precipitation are different fr
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More