The postmodern ideas and concepts have produced social, political and economic variables that have been affected by wars, crises, the role of globalization and the information revolution. They have created many variables in concepts and great variables in technological, artistic and cultural innovations. All these changes have contributed to changing the form of the theatrical show aesthetically and intellectually, which cast a shadow over the nature of the actor's performance who has become more demanding to change his performance and to find the mechanisms and new nature of work governing him corresponding to those variables and this prompted the researcher to adopt the subject (the performance variable of the actor's techniques in postmodern theatre show (. Research importance:It provides benefit to actors, directors and workers in the field of theater. The researcher in the theoretical framework tackled two sections:The first section: Postmodern conceptThe second section: the actor's performance in postmodernismThe researcher chose a sample for the analysis represented by the play (Azaiza), which was presented in 2014, and after the analysis, a set of results have been found and the most important of which are:- The theory of playing in the performance and performance technology clearly contributed to the blending of all the styles and artistic trends within one center that depends through their way on fragmentation, anarchy, contradiction, and the ambiguity and multiplicity of the meaning. Then the conclusions reached at and the most important of which are:-The performance variable of the actor's techniques is highlighted in postmodern presentations via subjugating the actor to the hegemony of the techniques that made him a sign subject to its authority within the show system.
Gaining economic policy of exceptional importance in severe unilateral Iraqi economy such as the economy, as oil revenues constitute the center of gravity in the internal and external balances, Economic policy have seen in Iraq beyond 2003 in absentia economic strategic vision and failure in the application of policies to achieve economic development, as there was a disconnect and lack of integration and coordination between macro policies of monetary policy and fiscal policy, especially as if they were floating two policies are not linked by a link
Summary
The book (Fatah al-Rahman reveals what is ambiguous in the Qur’an), which is a book of verbal similarities that tries to touch the Qur’an expression, and the subtle differences between its expressions and expressions. It appeared when it appeared in many chapters, from which I chose to delete in monolithic letters such as Ba and Ta, and to heal and delete in non-monosymbols such as (that) and (may) and (no), so the search came to two chapters The first is for deleting the monolithic letters, and the second is for deleting non-monosyllabic letters, preceded by introductory discussions revolving around the linguistic and idiomatic definition of deletion, a brief translation of the
... Show MoreWorld War II has brought suffering for all people; it has led people to have a nostalgic feeling. The war has many faces all of them are ugly, like death, separation, loneliness, violence, crime, betrayal, and disconnection and many other meanings. Michael Ondaatje in his novel The English Patient (1992) portrays a picture of the effect of World War II on four different characters; Hana a Canadian nurse, The English patient who is Hungarian, Caravaggio a Canadian-Italitan thief, and Kip an Indian sapper. They live together in one house, share their secrets and memories about World War II. Ondaatje brings them together to reveal their secrets and to heal their wounds of the war experience.
Egypt and Ethiopia have connected in a strong relation as there are historical facts that
deepen these relations, one of these is Egypt's cooperation in establishing the first economic
and financial banking system in Ethiopia.
Beside the religious relation between The Egyptian and Ethiopian churches the Nile River is
considered one of the effective connections
That strong then the relations as it leads to some tension between the two countries because
Ethiopia believes that Egypt seeks to control the river tries to build its project over the Blue
Nile means a threat to the Ethiopian national security.
The tension continues even after the revolution of 25th of January 2011because the Nahda
dam which is a clear t
Priority of road maintenance can be viewed as a process influenced by decision-makers with varying decision-making power. Each decision-maker may have their view and judgment depending on their function and responsibilities. Therefore, determining the priority of road maintenance can be thought of as a process of MCDM. Regarding the priority of road maintenance, this is a difficult MCDM problem involving uncertainty, qualitative criteria, and possible causal relationships between choice criteria. This paper aims to examine the applicability of multiple MCDM techniques, which are used for assessing the priority of road maintenance, by adapting them to this sector. Priority of road maintenance problems subject to internal
... Show MoreAbstract
Digital repositories are considered one of the integrated collaborative educational environments that help every researcher interested in developing the education and educational process. The learning resources provided by the repositories are suitable for every researcher, so digital information can be stored and exchanged by ensuring the participation and cooperation of researchers, teachers, and those who are interested, as well as curricula experts, teachers, and students, to exchange each other’s experiences in constantly updating that information as a reason for developing their performance in education. This reveals the importance of the role of educational digital institutions by providing and
... Show MoreThe research aims to answer the questions that revolve in the mind of mankind about how to create creation, how it existed prior to creation, who created existence, and the characteristics of that presence. The researcher also wanted to show that the culture of Imam Ali (peace be upon him) In the book of Adam, peace be upon him, God has punished Adam (peace be upon him) for not having sinned. Because his wife is the one who fed him the fruit of the tree, and this is contrary to what was stated in the sermon of Imam (peace be upon him) who Z Adam (peace be upon him) is the one who trusted Satan and Gwighth.We note that the approach of the rhetoric has pointed to the creation of angels and did not refer to the creation of Eve and the class
... Show MoreThe research aims to answer the questions that revolve in the mind of mankind about how to create creation, how it existed prior to creation, who created existence, and the characteristics of that presence. The researcher also wanted to show that the culture of Imam Ali (peace be upon him) In the book of Adam, peace be upon him, God has punished Adam (peace be upon him) for not having sinned. Because his wife is the one who fed him the fruit of the tree, and this is contrary to what was stated in the sermon of Imam (peace be upon him) who Z Adam (peace be upon him) is the one who trusted Satan and Gwighth.
We note that the approach of the rhetoric has pointed to the creation of angels and did not refer to
... Show MoreThe growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication
... Show More