The creative arts in general and the theatre in specific represent man's rushing and carving for freedom, goodness and beauty, and the relation between creativity and freedom has always been fluctuating following the censorship pressures of all types and shapes the political, religious and social. Since the theatre is the closest and more touching creative art to the problems of the society of numerous types and levels and it was and has always been playing an enlightening role in shedding light on what the societies experiencing with crises and problems in all directions. The theatre, thus, derives the essence of existence from life, through topics concerned with what the human being is. It seeks to be the real witness and partner in getting man rid of problems and everyday worries. This relation may be subject to treatments in many arts, but it manifested itself in the formation of the real image in the theatrical art.
Therefore, the two researchers find it necessary to search and reveal the mechanisms of the directive vision and the method of its transformations by some theatre directors, who added creative and aesthetic concepts to their theatrical shows through the concepts of transformations and the directive vision.
As cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show MoreStudy the role of CoQ10 and IGFBP-1 in obese male patients with diabetic mellitus type 2. ELISA method was used to assay Serum CoQ10 and IGFBP-1. Blood was taken with drawn sample from 30 obese normal patients with age range (40-60) years, 30 diabetic patients with age range (40-60) years at duration of disease (1-5) years and 30 normal healthy patients. The mean difference between T2DM according to CoQ10 (12.5±1.1) was decreased than the mean of IFG (21.8±3.2) (P 0.002) and the mean difference between T2DM according to IGFBPs (0.65±0.06) was decreased than the mean of IFG (3.2±0.3) (P 0.000). While no significant difference between mean age of DM2 patients (55.5±1.06), and IFG (55.6±0.9) (p 0.90), no significant difference bet
... Show MoreAbstract:
In light of globalization and internationalization of financial markets, issues arising from financial crises have become increasingly serious and fundamental, creating a lot of debate among experts around the world. So, many studies have attempted to investigate what measures can be taken to detect and prevent crises before they devastate the economies.
Therefore, this paper examines the Effectiveness of the Monetary Policy (MP) to Avoid, Reduce or Treat the Financial Crisis in Malaysia. Scholars have yet to agree on the issue
... Show MoreThis study aimed to isolate and identify Cryptococcus species from three distinct sources: sputum samples of pigeon fanciers, dried pigeon droppings, and eucalyptus tree leaves. A total of 150 specimens were collected over a two-month period, comprising 50 samples each from human sputum, pigeon droppings collected across various areas of Baghdad, and eucalyptus leaves obtained from the Baghdad College of Veterinary Medicine. All samples were cultured on Sabouraud dextrose agar supplemented with chloramphenicol and incubated at 25°C for 2–3 days. From the initial cultures, 20 isolates presumptively identified as Cryptococcus spp. were obtained: 6 isolates (12%) from human sputum, 9 isolates (18%) from pigeon droppings, and 5 isol
... Show MorePurpose: To compare the antibacterial-enhancing efficacy of aloe vera and honey in salicylic acid topical formulations against acne. Method: Six formulations containing 5 % salicylic acid were developed as creams and gels as follows: Formulations S, V and H were creams containing salicylic acid alone (S), salicylic acid with 28 % aloe vera (V), and salicylic acid with 10 % honey (H). Formulations J, M, and B were gels containing salicylic acid alone (J), salicylic acid with aloe vera 20 % (M) and salicylic acid with 12 % honey (B). Each formula was evaluated for colour, odour, pH, viscosity, spreadability, and stability under different temperatures (25, 30, and 60oC) and times (1 hour, 1 day, and 1 week). Furthermore, antibacterial
... Show MoreChronic kidney disease (CKD) is described as an abnormalities of renal function, existing for a long period of time. By reason of the early grades of Chronic kidney disease can be experiences no symptoms, its premature identification is strenuous. initial stage CRD can cause various complications, such as anemia, matabolyic disorders of bone mineral. The study was done to assess the effect the chronic renal disease stage on the Osteoprotegerin, 1,25 dihydroxyvitamin D, Obestatin levels and some biochemical parameters in patients not undertaken dialysis therapy. In this case-control study fifty-five patients with Kidney failure and fourty healthy people were examined. Circulating concentrations of Osteoprotegerin, 1,25 dihydroxyvitamin D
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More