The creative arts in general and the theatre in specific represent man's rushing and carving for freedom, goodness and beauty, and the relation between creativity and freedom has always been fluctuating following the censorship pressures of all types and shapes the political, religious and social. Since the theatre is the closest and more touching creative art to the problems of the society of numerous types and levels and it was and has always been playing an enlightening role in shedding light on what the societies experiencing with crises and problems in all directions. The theatre, thus, derives the essence of existence from life, through topics concerned with what the human being is. It seeks to be the real witness and partner in getting man rid of problems and everyday worries. This relation may be subject to treatments in many arts, but it manifested itself in the formation of the real image in the theatrical art.
Therefore, the two researchers find it necessary to search and reveal the mechanisms of the directive vision and the method of its transformations by some theatre directors, who added creative and aesthetic concepts to their theatrical shows through the concepts of transformations and the directive vision.
The sale of facial features is a new modern contractual development that resulted from the fast transformations in technology, leading to legal, and ethical obligations. As the need rises for human faces to be used in robots, especially in relation to industries that necessitate direct human interaction, like hospitality and retail, the potential of Artificial Intelligence (AI) generated hyper realistic facial images poses legal and cybersecurity challenges. This paper examines the legal terrain that has developed in the sale of real and AI generated human facial features, and specifically the risks of identity fraud, data misuse and privacy violations. Deep learning (DL) algorithms are analyzed for their ability to detect AI genera
... Show MoreAim: This study aimed to investigate the impact of rabbit serum on skin wound healing with the help of histological examination. Materials and Methods: A total of ten indigenous rabbits were used in this study. The animals were divided into two groups: control and serum- treated. The histological assessment was done with a paraffin embedding technique and the histological sections were stained with H&E stain. Results: Severe infiltration of polymorphonuclear leukocytes with severe fibrin deposits were seen in serum treated group at 2 days post-injury; at 7 days post-injury the changes revealed moderate fibroplasia, fibrin deposit and severe infiltration of both mononuclear and polymorphonuclear leukocytes; at 14 days post-inju
... Show MoreOptimizing system performance in dynamic and heterogeneous environments and the efficient management of computational tasks are crucial. This paper therefore looks at task scheduling and resource allocation algorithms in some depth. The work evaluates five algorithms: Genetic Algorithms (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Firefly Algorithm (FA) and Simulated Annealing (SA) across various workloads achieved by varying the task-to-node ratio. The paper identifies Finish Time and Deadline as two key performance metrics for gauging the efficacy of an algorithm, and a comprehensive investigation of the behaviors of these algorithms across different workloads was carried out. Results from the experiment
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThe work reported in this study focusing on the abrasive wear behavior for three types of pipes used in oil industries (Carbone steel, Alloy steel and Stainless steel) using a wear apparatus for dry and wet tests, manufactured according to ASTM G65. Silica sand with
hardness (1000-1100) HV was used as abrasive material. The abrasive wear of these pipes has been measured experimentally by measuring the wear rate for each case under different sliding speeds, applied loads, and sand conditions (dry or wet). All tests have been conducted using sand of particle size (200-425) µm, ambient temperature of 34.5 °C and humidity 22% (Lab conditions).
The results show that the material loss due to abrasive wear increased monotonically with
In this paper, the characteristics of microstrip monopole antennas are studied firstly in free space. Secondly, the effects of the human body on the studied antenna's performance are investigated for wearable communications. Different patch shapes of microstrip monopole antenna are chosen to operate at two bands: industrial scientific and medical band (ISM) and ultra-wideband (UWB) for wearable applications. The studied antenna consists of a radiating element on one side of the substrate and a partial ground plane on the other side. The antenna is supposed to fabricate on cloth fabric whose relative dielectric constant is Ɛr =1.7. At the same time, the pure copper could be used as the conducting part representing both t
... Show More