The theater has live foundations that interact with all symbols and signs. It has never been far from these innovations and developments in the manner of dealing with those symbols and how and the extent of their effects on society through the world of technology because the theatrical performance contributes to its structure, a technique that is employed by designers in various technologies such as ( Music, lighting and sound effects engineer, as well as fashion designer, architecture, and modeling designer). The theater today also relied on various interactive techniques represented in the use of body language and a sign in order to communicate the meaning by forming movements, singing and dancing in order for the recipient to interact with it. The interactive symbol in the theater is not a newborn today, but from the time of the Greeks to the present day, and on this basis the researcher determined what they are How to employ the theory of symbolic interactivity in building the scene in the Iraqi theater show?Then he demonstrated the importance of his research, which is one of the scientific research efforts in the importance of symbolic interactivity and its implications for the techniques of Iraqi theatrical presentation in scenographic construction, and then it made a statement of the goal of the research and its limits and finally definition of its most important terminology, which is the concept of theatrical landscape design and symbolism. As for the theoretical framework, the researcher divided it into two topics, in the first one explaining the concept of symbolic interaction in philosophy, while in the second topic theater design and its manifestations in theater and a set of indicators that resulted from the theoretical framework. The research procedures include the research community and its intentional samples represented by the following theatrical designs: ((Death of a stubborn citizen)), then analyzing the sample and indicating the techniques that the director used with the designer. Finally, the researcher's findings and conclusions, then the proposals and recommendations, and the list of sources.
The current study was designed to investigate the histological structure of the cerebellum in the Iraqi frog
Reinforced concrete slabs are one of the most important and complicated elements of a building. For supported edges slabs, if the ratio of long span to short span is equal or less than two then the slab is considered as two-way slab otherwise is consider as one-way slab. Two-way reinforced concrete slabs are common in use in reinforced concrete buildings due to geometrically arrangement of columns suggested by architects who prefer a symmetric distribution of columns in their plans. Elastic theory is usually used for analysis of concrete slabs. However, for several reasons design methods based on elastic principles are limited in their function. Correspondingly, limit state analysis o
The Ant System Algorithm (ASA) is a member of the ant colony algorithms family in swarm intelligence methods (part of the Artificial Intelligence field), which is based on the behavior of ants seeking a path and a source of food in their colonies. The aim of This algorithm is to search for an optimal solution for Combinational Optimization Problems (COP) for which is extremely difficult to find solution using the classical methods like linear and non-linear programming methods.
The Ant System Algorithm was used in the management of water resources field in Iraq, specifically for Haditha dam which is one of the most important dams in Iraq. The target is to find out an efficient management system for
... Show MoreIs the subject of the financial structure of the most important topics for which she received the interests of scientific research in the field of financial management , as it emerged several theories about choosing a financial structure appropriate for the facility and behavior change funding them , and in spite of that there is no agreement on a specific theory answer various questions in this regard , and a special issue of the financial structure optimization.
The objective of the research was to identify the most important theories of the structure of modern financial theory has been to focus on the capture of financial firms in two different stages of their life cycle , so-called growth and ma
... Show MoreThis research dealt with shedding light on the nature of material misrepresentations, in addition to knowing the extent to which the quality of accounting information systems contributes to reducing material misrepresentations On the theoretical side, a number of sources were relied upon in dealing with the research problem and presentation of the topic, while in the practical side, it was relied on the questionnaire form, where the research sample was (accountants and auditors), where 50 forms were distributed and 50 were received, and the data was analyzed and hypotheses tested through the program Statistical spss to show the relationship between the variables. The research reached a number of conclusions, the most important of which is t
... Show MorePraise be to God, Lord of the Worlds, and prayers and peace be upon the Master of Messengers, and upon his family and companions
And whoever follows his guidance until the Day of Judgment. As for what follows: Islamic law commands Muslims to unite, reject disagreement, and not dispute, and to spread the spirit of tolerance and love among them. God Almighty said: “And hold fast to the rope of God all of you and do not become divided, and remember the favor of God upon you when you are enemies and He has joined your hearts.” So, by His grace, you became brothers (1), and He said: (And You will be like those who became divided and disagreed after the clear proofs had come to them. It is they - for them is a great punishment.) (2
... Show MoreThe Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show MoreThe cities are not yet a temporal status in the process of the human and civilization development. The cities consider as a life pattern, this mean that people cannot live without cities, which surround us. Several phenomena like globalization, revolution of information, technical development, increased of consumption, do not confirmed without the living in cities. The urbanization – in its simple meaning – means transferring from rural community to city community. In other word, it means that socioeconomic changes happened subject to the patterns and conditions of the urban life. Each government depend a certain policy, this policy contains set of plans and programs, that targeting to affect the population factors and the st
... Show More