The postmodern ideas and concepts have produced social, political and economic variables that have been affected by wars, crises, the role of globalization and the information revolution. They have created many variables in concepts and great variables in technological, artistic and cultural innovations. All these changes have contributed to changing the form of the theatrical show aesthetically and intellectually, which cast a shadow over the nature of the actor's performance who has become more demanding to change his performance and to find the mechanisms and new nature of work governing him corresponding to those variables and this prompted the researcher to adopt the subject (the performance variable of the actor's techniques in postmodern theatre show (. Research importance:It provides benefit to actors, directors and workers in the field of theater. The researcher in the theoretical framework tackled two sections:The first section: Postmodern conceptThe second section: the actor's performance in postmodernismThe researcher chose a sample for the analysis represented by the play (Azaiza), which was presented in 2014, and after the analysis, a set of results have been found and the most important of which are:- The theory of playing in the performance and performance technology clearly contributed to the blending of all the styles and artistic trends within one center that depends through their way on fragmentation, anarchy, contradiction, and the ambiguity and multiplicity of the meaning. Then the conclusions reached at and the most important of which are:-The performance variable of the actor's techniques is highlighted in postmodern presentations via subjugating the actor to the hegemony of the techniques that made him a sign subject to its authority within the show system.
The research titled (narrations of Imam Muhammad bin Ali al-Baqir (upon him be peace) about washing, in the four books of Sunan - study and analysis -) deals with what was reported from the noble and purified hadiths about him, peace be upon him, through the four hadith works represented by Sunan Abu Dawud (d. 275 AH). And Al-Jami’ Al-Kabir (Sunan Al-Tirmidhi) (d. 279 AH), Sunan Al-Nasa’i (Al-Mujtaba) (d. 303 AH), and Sunan Ibn Majah (d. 273 AH), who is the venerable imam and jurist from the House of Prophethood, as he transmitted many traces from the Prophet, may God bless him and grant him peace. Upon him and his family, peace be upon him. The study focused on his narrations, including the rulings on washing
Feed Forward Back Propagation artificial neural network (ANN) model utilizing the MATLAB Neural Network Toolbox is designed for the prediction of surface roughness of Duplex Stainless Steel during orthogonal turning with uncoated carbide insert tool. Turning experiments were performed at various process conditions (feed rate, cutting speed, and cutting depth). Utilizing the Taguchi experimental design method, an optimum ANN architecture with the Levenberg-Marquardt training algorithm was obtained. Parametric research was performed with the optimized ANN architecture to report the impact of every turning parameter on the roughness of the surface. The results suggested that machining at a cutting speed of 355 rpm with a feed rate of 0.07 m
... Show MorePhase change material (PCM) is considered as one of the most effective thermal energy storage (TES) systems to balance energy supply and demand. A key challenge in designing efficient PCM-based TES systems lies in the enhancement of heat transmission during phase transition. This study numerically examines the privilege of employing twisted-fin arrays inside a shell-and-tube latent heat storage unit to improve the solidification performance. The presence of twisted fins contributes to the dominating role of heat conduction by their curved shapes, which restricts the role of natural convection but largely aids the overall heat-transfer process during solidification. The heat-discharge
The study aimed to identify the reality of the application of cost accounting system in the contracting institutions in Saudi Arabia, and the extent of the reflection of the application of this system on the effectiveness and efficiency of the general performance of these institutions. Where the research community consists of the contracting institutions operating in the Saudi Arabia, and then a suitable random sample was selected from seventy one institutions. The researchers used the historical method to track the previous studies as well as the descriptive approach to conducting the field study. The study data were analyzed by SPSS statistical program.
The results of this study conclude that there is a
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreImage quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel
... Show MoreObjective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using
... Show MoreUsing remote sensing technology and modeling methodologies to monitor changes in land surface temperature (LST) and urban heat islands (UHI) has become an essential reference for making decisions on sustainable land use. This study estimates LST and UHI in Salah al-din Province to contribute to land management, Urban planning, or climate resilience in the region; as a result of environmental changes in recent years, LANDSAT Satellite Imagery from 2014- 2024 was implemented to estimate the LST and UHI indexes in Salah al-din Province, ArcGIS 10.7 was use to calculate the indices, and The normalized mean vegetation index (NDVI) was calculated as it is closely related to extracting (LST