Extemporization is the ability of the actor to reflect his internal being. It gives a sort of confidence and an ability to show the personal countenance of the role away from tension and rigidity. By extemporization, it is possible to deal with and criticize the real living life so it is an intellectual, emotional, sensual, and perceptive process connected with the psychological energy and the emotional memory and all this goes under the control of the director and his instigations and instructions depending on what the text involves of intellectual, social and psychological motivators so it primarily depends on talent, chance and discussion. The research involves four chapters; the first contains the problem which is related to the technique adopted by the director to organize the process of the dramatic extemporization. The importance of the research lies in its focus on one of the acting activities and on identifying the guidance and organization of the extemporization process by the theatrical director. The aim of the research is to identify the director's technique in the extemporization process whereas the limits are restricted to the performances in (2005)the College of Fine Arts. The chapter ends with the definitions of the terminologies. The second chapter which is the theoretical framework involves two parts; the first deals with extemporization as a psychological concept whereas the second deals with the development of this same concept in drama and the chapter finalizes with results of the theoretical framework. The third chapter revolves around the procedures and the samples; two performances have been chosen to study the technique of extemporization. The fourth chapter contains the results the researcher has come up with the most important of which are: 1. Extemporization is considered an essential element with different ratios according to the director and his working technique. 2. The freedom given to the actor varies from one director to the other according to the motivator (the text). 3. Extemporization is shown in the presentation and the acting methods according to the director's view point
Carbon Nanopowder was fabricated by arc discharge technique at deposition pressure of 10-5 mbar Argon gas on glass substrates. The prepared carbon nano- powder was collected from chamber and purified with nitric acid at 323K .The morphology and crystalline structure of the prepared powder was examined by X-Ray Diffraction (XRD), Atomic Force Microscope (AFM), and Scanning Electron Microscope (SEM). XRD spectrums showed that the powder exhibits amorphous structure and after purification, the powder showed hexagonal structure with a preferential orientation along(002) direction ,where AFM and SEM gave very compatible estimation on the grain size and shape of the nanopowder.
The finite element approach is used to solve a variety of difficulties, including well bore stability, fluid flow production and injection wells, mechanical issues and others. Geomechanics is a term that includes a number of important aspects in the petroleum industry, such as studying the changes that can be occur in oil reservoirs and geological structures, and providing a picture of oil well stability during drilling. The current review study concerned about the advancements in the application of the finite element method (FEM) in the geomechanical field over a course of century.
Firstly, the study presented the early advancements of this method by development the structural framework of stress, make numerical computer solution
... Show MoreThe study the problem emerged in the inability of local companies to enter the field of active competition with other companies operating in the same economic sector due to the high cost of their products, hence, the companies that want to apply this technique can effectively compete in order to achieve those objectives.
So this study focused on the goal of reducing the cost of products by reducing the cost product to a minimum , as the study was based in its hypothesis on the ability of companies to application this technique which in turn leads to increased profits under conditions of normal working and the power available and their potential in improving the quality of its products, as well as the need for full coordina
... Show MoreZ-scan has been utilized for studying the non-linear properties and optical limiting behaviors of the dye Copper Phthalocyanine thin films. The refractive index is negative, which indicates a self-defocusing behavior and non-linear absorption coefficient (
A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.
This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
This paper demonstrates a new technique based on a combined form of the new transform method with homotopy perturbation method to find the suitable accurate solution of autonomous Equations with initial condition. This technique is called the transform homotopy perturbation method (THPM). It can be used to solve the problems without resorting to the frequency domain.The implementation of the suggested method demonstrates the usefulness in finding exact solution for linear and nonlinear problems. The practical results show the efficiency and reliability of technique and easier implemented than HPM in finding exact solutions.Finally, all algorithms in this paper implemented in MATLAB version 7.12.