eroticism formed a basic focus in contemporary studies and caused a problematic clash in terms of terminology, as some interpreted it by pornography and another interpreted it as aesthetic, so this research came to seek to decipher this terminological clash, and to be known as erotech in terms of cognitive significance, Accordingly, the research culminated in four chapters. The first chapter (Methodological Framework) talks about the research problem that came according to the following question: “How is the erotic act built in the theatrical text and what are the epistemic connotations that express its subjectivity? Then followed by the importance of research and the need for it, then the objective of the research, and the boundaries of research that were determined in time (2009) and spatially / Iraq, and objectively / about me by studying the erotica as a sign The chapter was concluded by defining the terms and defining them As for the second chapter, it consists of two researches, the first one is called: “Aerotec is an epistemic connotation” and the second is “Aerotec and its manifestations in the theatrical text.” Then the chapter was concluded with the results of the theoretical framework. ) Included On the research community, which consisted of three plays, then the research sample that was formed from a play taken from the research community by the intentional method and adopted the results of the theoretical framework as a tool for research to conclude the chapter by analyzing the research sample, then the fourth chapter came under the name of results and conclusions and the most important of these The results (the text formed an aesthetic and pictorial space, through body, the female body (Dzdemonh), and overwhelmed by the details of (Bailoger), to broadcast through his vocabulary erotica erotic sexual instinct on the tongue (Iago), and conclusions and it was the most important (try the text that gives the receiver a form aesthetically pleasing geography The female body) to conclude the research with a list of references and sources .
This research shed light on the relationship between the social orientation of the marketing (interests of the Organization ,the welfare of society, satisfaction the customer) strategies competitive dimensions of (cost leadership strategy, differentiation strategy, focus and strategy), As well as to to seek to achieve a number of knowledge and applied goals, and represented the field research problem extent of interesting researched the application of social orientation and interest in achieving competitive strategy and omission of this interest in the hotels the surveyed Organization, Based on this problem, and to clarify the relationshi
... Show MorePurpose :This study seeks to provide the point of view stands on the marketing performance of the banks in the context of Dynamic Equilibrium of marketing. It aims to develop a prototype of measuring marketing performance under the umbrella of marketing dynamic prototype, embodied of the strategic alliance and competition, and the laws and legislation, and to explore any of the dimensions more effective in achieving performance. This study aims to discusses the importance of the Dynamic Equilibrium of marketing and it role in achieving the marketing performance <
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreExchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreBuilding a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro
... Show More
The research aims to build an integrated frame of knowledge for the basic research topics, represented by (assimilation of knowledge, strategic clarity) and their basic variables, by examining the most important scientific propositions on these topics in administrative thought, and framing the knowledge contained in them, in a serious attempt to provide appropriate answers to questions The research dilemma, and the research was applied in the Iraqi Airways Company, whose number is (1200) employees, and the descriptive and analytical approach was adopted in conducting the research. A valid form for statistical analysis, i.e., with a retrieval rate of (92%). The two researchers used the (SPSS & AMOS) program for
... Show MoreBackground: The iron deficiency anemia along with hyperphosphatemia are the main complications of dialysis patients. Traditional iron supplement has been failed to correct iron deficiency anemia, therefore, the current study aimed to investigate the efficacy and tolerability of new phosphate binder, ferric citrate, in a sample of Iraqi patients with end stage renal disease on maintenance hemodialysis. Method: Prospective, randomized, open label, active controlled trial was conducted in one center for dialysis in Babylon governance. Patients were randomized to receive ferric citrate with dose of 6 g/d and calcium carbonate with dose of 3 g/d for eight weeks. Hemoglobin concentration, mean corpuscular hemoglobin concentration and count o
... Show Moreبعد ثورة تموز عام 1958في العراق, لم يكن يسمح للقطاع الخاص بأن تكون له استثمارات كبيرة في القطاعات الاقتصادية. وذلك بسبب الإيديولوجيات التي كانت تؤطر الفكر السياسي. حيث كان النهج الاشتراكي هو الغالب في إدارة الأنشطة الاقتصادية. إذ قامت الدولة بتأميم معظم الاستثمارات الخاصة الكبيرة ،لاس
... Show MoreThis paper examines the gaps in Lebanese building law as well as the exploitation of contractors, stakeholders, and residents in order to make illegal profits at the expense of The Shape of urban agglomerations and their expansion in cities and rural areas, which is contrary to the principles of sustainable land development. It also emphasizes the amplification of the factors of vertical and horizontal building investments in the implementation of buildings contrary to the license, as well as the burden that this places on the city's resulting infrastructure and ability to absorb the activities and needs of its residents. The study then presents recommendations in the process of transformation in the technique of planning and application
... Show More