The building of the Babylonian theater is considered as one of the distinctive buildings where its foundations have remained steadfast in the face of geographical changes, social's erosion and groundwater that threatened almost all traces of Babylon despite the destruction of the outer structure of the building. The general directorate of antiques performed prospection for those foundations (the ground map), and then the building was completed by new bricks over the original scheme. It became clear when examining the building; its components and foundations, that the building is unique in comparison with the old buildings of the world throughout Iraq. There are similar buildings in other places like Jordan and North Africa such as Leptis Magna's theater and Sabratha's theater which were built by the Greeks in Libya. A confusion has been emerged about the real builder of the theater where there is no document dated whether the building attributed to a company or a person. To manage this problem, the researcher reviewed the historical documents that could refer to that case. Moreover, he conducted an architectural and sociological comparison between Babylonian theater and the Greek and Roman theaters which were known and built in synchronized intervals with the creation of the Babylonian theater in order to know the differences and similarities between them.The researcher used descriptive and comparative method in the analysis, based on historical documents in order to reach logical conclusions that may dispel those doubts and solve the problem.The most important findings were the existence of the Babylonian theater building before entering Alexander the Great to the city of Babylon, the uniqueness and specificity of this building and the lack of full similarity between Babylonian theater and the Greek and Roman theaters
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreRandom laser gain media is synthesized with different types of dye at the same concentration (1×10-3 M) as an active material and silicon dioxide NPs (silica SiO2) as scatter centers through the Sol-Gel technique. The prepared samples are tested with UV–Vis spectroscopy, Fluorescence Spectroscopy, Field Emission Scanning Electron Microscopy (FESEM), and Energy Dispersive X-ray Diffraction (EDX). The end result demonstrates that doped dyes with silica nanoparticles at a concentration of 0.0016 mol/ml have lower absorbance and higher fluorescence spectra than pure dyes. FESEM scans revealed that the morphology of nanocrystalline silica is clusters of nano-sized spherical particles in the range (25-67) nm. It is con
... Show MoreThe historical center cities were exposed to change, which included its social and economical structures, Which led to sweeping changes in land use, causing a change in the result, in urban fabric and the physical structure and therefore to see visual. We have attracted these centers as a result of pressure from urban development and contemporary reflection of the agents of change which have been hit during the late period a development residential newly not sympathize mostly with the content of the historical and at the expense of removing large parts of the urban fabric and replace it with patterns of structural and styles of architecture has not been connected with reality. Which led to the loss of some historical and architec
... Show MoreHistorical concepts are among the concepts that are difficult to present to the pre-school child except by using modern techniques, as well as the difficulty of making visits to all historical monuments and going back to antiquity and the lack of studies in this area, therefore, we need an attractive medium that children love which is able to convey some abstract concepts that are difficult to teach to children using traditional methods, and among these activities that the kindergarten provides to children are the stories through which they develop their linguistic wealth, consolidate their religious and spiritual inclinations, refine their correct morals, and form their proper attitudes, knowledge and life concepts.
The
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThe Purpose of this research is a comparison between two types of multivariate GARCH models BEKK and DVECH to forecast using financial time series which are the series of daily Iraqi dinar exchange rate with dollar, the global daily of Oil price with dollar and the global daily of gold price with dollar for the period from 01/01/2014 till 01/01/2016.The estimation, testing and forecasting process has been computed through the program RATS. Three time series have been transferred to the three asset returns to get the Stationarity, some tests were conducted including Ljung- Box, Multivariate Q and Multivariate ARCH to Returns Series and Residuals Series for both models with comparison between the estimation and for
... Show MoreThis study discusses the semiotic of the Islamic blazon - a related analytical study between the Islamic blazon and its visual publicity message. The aim of the current study is to explore the related relationship between the Islamic blazon and its visual publicity message. The sample is contained Five of Islamic blazon in the Mamelukes period which is between 1250 to 1517. The methodology is descriptive-analytical, and the result is that there is a clear relation between the Islamic blazon with its visual publicity message. This study's recommendation is to go towards analyzing the meanings of the cultural legacies of the Islamic civilization, and researching the implicit meanings accompanying these features leads to a deeper understand
... Show MoreThe purpose of this research is to a treatment the impact of Views outliers to the estimators of a distributed arrival and service to the theory of queues and estimate the distribution parameters depending on the robust estimators, and when he was outliers greatest impact in the process of estimating the both distributions mentioned parameters, it was necessary to use way to test that does these data contain abnormal values or not? it was used the method ( Tukey ) for this purpose and is of the most popular ways to discover the outliers , it shows that there are views abnormal (outliers ) in the estimators of each of the distributional arrival and service, which have a significant impact on the calculation of these estimato
... Show More