Summary Search Alachtgalat process semantic encoding carried out by the actor inside the theater to deliver the intellectual sense, and social, as well as the aesthetic to the recipient, the fact that the code is the function is operated relationship in accordance with the prior intent to deliver the implications of a particular intent, too, and the fact that encryption is the best way to transfer messages in system theater, where should the actor that has the ability to create images (sensory) or intellectual new in human consciousness on the basis of conversion of impressions collected from reality and re technically formed inside the theater, allowing the recipient to arrange these marks to obtain the meaning that lies in them. So he came to answer the question follows: How can the representative of the performance today produces blades recipient can then decode the implications, understand and communicate with them.
Search section according to the following: where identified the problem of the research and its importance and its objectives and its borders and then the investigator should define the term blades in order to correct the search, then the theoretical framework came across two sections: the first, for semantic encoding and most prominent divisions theorists of the encryption process and the relationship of the code give indications. The second section dealt engage in semantic of the blade in the work of actor and how to establish a cipher. Find out after the set indicators can be a tool for the analysis of the sample. And then came the analysis in which the researcher eating a play (Romeo and Juliet in Baghdad) Sample. analysis. After analysis of the number of search results the most important output: - (for movement and gestures actor Representative building Chwira are references to a multi-cultural, psychological and social level of the character, they also contribute to enhancing the dramatic act and push it ahead). Then a list of sources relied upon in the search and finally the title and abstract in English
To evaluate the bioactivity and the cytocompatibility of experimental Bioglass-reinforced polyethylene-based root-canal filling materials. The thermal properties of the experimental materials were also evaluated using differential scanning calorimetry, while their radiopacity was assessed using a grey-scale value (GSV) aluminium step wedge and a phosphor plate digital system. Bioglass 45S5 (BAG), polyethylene and Strontium oxide (SrO) were used to create tailored composite fibres. The filler distribution within the composites was assessed using SEM, while their bioactivity was evaluated through infrared spectroscopy (FTIR) after storage in simulated body fluid (SBF). The radiopacity of the composite fibres and their thermal properties were
... Show MoreMoisture damage is described as a reduction in stiffness and strength durability in asphalt mixtures due to moisture. This study investigated the influence of adding nano silica (NS) to the Asphalt on the moisture susceptibility of hot-mix-asphalt (HMA) mixtures under different aging conditions. NS was mixed with asphalt binder at concentrations of 2%, 4%, and 6% by weight of the binder. To detect the microstructure changes of modified Asphalt and estimate the dispersion of NS within the Asphalt, the field emission scanning electron microscope (FE-SEM) was used. To examine the performance of Asphalt mixed with NS at different aging stages (short-term and long-term aging), asphalt mixture tests such as Marshall stability,
... Show MoreObjective: Preparing training in a diverse style for young basketball players, and identifying the effect of training in a diverse style on some physical abilities (for young basketball players).Research methodology: the researchers chose the experimental method to know the research problem and its objectives, as it is represented by designing two equal groups, the control and the experimental, with pre- and post-tests. The study community was determined by youth basketball players for the 2023-2024 season, as the research community is (104) players, and a sample of (20) players was drawn from the youth category from Al-A'dhamiyah Sports Club, and it was chosen intentionally because they are the clubs most committed to training, as
... Show MoreBackground: Adipose derived-mesenchymal stem cells have been used as an alternative to bone marrow cells in this study. Objective: We investigated the in vitro isolation, identification, and differentiation of stem cells into neuron cells, in order to produce neuron cells via cell culture, which would be useful in nerve injury treatment. Method: Mouse adipose mesenchymal stem cells were dissected from the abdominal subcutaneous region. Neural differentiation was induced using β-mercaptoethanol. This study included two different neural stage markers, i.e. nestin and neurofilament light-chain, to detect immature and mature neurons, respectively. Results: The immunocytochemistry results showed that the use of β-mercaptoethanol resulted in
... Show MoreHigh-volume traffic with ultra-heavy axle loads combined with extremely hot weather conditions increases the propagation of rutting in flexible pavement road networks. Several studies suggested using nanomaterials in asphalt modification to delay the deterioration of asphalt pavement. The current work aims to improve the resistance of hot mix asphalt (HMA) to rutting by incorporating Nano Silica (NS) in specific concentrations. NS was blended into asphalt mixtures in concentrations of 2, 4, and 6% by weight of the binder. The behavior of asphalt mixtures subjected to aging was investigated at different stages (short-term and long-term aging). The performance characteristics of the asphalt mixtures were evaluated using the Marshall s
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More