In this research study, I tried to trace the epic effect to learn how it was understood and how it was used. Following the descriptive and analytical approach in the research, the first chapter dealt with a presentation of the methodological framework of the problem, the goal, the limits of the research, the importance and the need for it and the definition of terms, as well as the theoretical framework which consisted of two topics, including the impact of the epic theater on the world theater and the second the effect of the epic theater on the Arab theater, This came by tracing the epic impact on the world stage of the Greeks, the Middle Ages, the Renaissance, and the Arab theater of the twentieth century.
As for the second topic, which deals with the impact of epic theater on the structure of the Arab theatrical text in general and the Iraqi theater in particular, by reviewing some writers who have been affected by this approach.
As for the third chapter, it came with the procedures and analysis of the intentional sample in which most of the epic elements were found, which facilitated the task to be achieved and the desired research objectives.
The fourth chapter deals with the findings and conclusions as well as the list of sources and references
The impact of television has made it an essential technology that can't be dispensed with in all circumstances and situations, measuring the society's need for it. Some argue that there is no stronger media than television in introducing people of the world to each other, as it has the most powerful impact and attracts millions of viewers.
Television is deemed as the most effective tool of media as it is designed to capture both sound and image. The image, in itself, has the ability to engage and interact with our thoughts. In light of the aforementioned, it is noticeable that this interactive medium (television) has significantly evolved over the years, thanks to modern technologies that have been introduced over time. These advancem
This research paper looks to put its hands on sufi symbols which are applied by the algerian poet د abdallah hammadi د in his poetical works . the symbols it relies on are : ( symbolisme of wine . symbolisme of light . symbolisme of night . sufisme and nature , femal symbols ) .
From these symbols we try to show its range of ability to apply it , with trying to determine its meaningful , dimensions .
The research aims to explain the role of the flexible budget in assessing the feedback resulting from deviations by comparing the actual results with the planned performance in light of the economic crisis that the world witnessed during the spread of Corona disease. As most companies, including the Electronic Industries Company, face the problem of controlling production costs and are trying hard to reduce these costs to the lowest level starting from measuring these costs and allocating them and distributing them to products. This helps in controlling deviations and thus the flexible budget becomes a tool that helps in controlling elements Costs
Microfibers released by synthetic clothes have a significant negative effect on the environment. Several solutions have been proposed and evaluated for their effectiveness, but studies have failed to address the human-centered aspects of these products. In this research, the possibilities and needs from a consumer perspective for a new filtering system for domestic washing machines were examined. First, a quantitative (questionnaire) and a qualitative (interviews and observations) exploration were done to understand the desired requirements from a user perspective. Next, the acceptance of various existing solutions for microfiber catching was investigated. To verify these requirements, a new concept was designed and evaluated with a
... Show MoreThe Significance of this research comes as a result of the development occurring in various life fields including the field of technical and technological development in the domain of industrial products which are in direct touch with the receiver, and because the study of deletion and addition mechanism didn't Find the Scientific space through researches and Studies. On this basis , the aim of this study is defining the forms of deletion and addition mechanism in designing the industrial product in a way that fits the functional presser . As to the limitations of this study, they involve examples of readymade Turkish House furniture, which is available in Iraqi local markets in Baghdad city 2013. The study included four chapters. The fi
... Show MoreHands have consistently been an important vehicle in the transmission of disease (1). Thus, thorough hand-washing remains the single most important factor in preventing infection specially in hospitals and labs.Twenty-nine non-clinical volunteers (do not work or come in contact with a clinical or hospital setting) that lacked visible skin injuries, eczema or apparent skin disease were used, those subjects were all tested by a material of each of the three used in the study weekly and laboratory tests were done pre- and post washing.All three material were effective , Eugenol extract as effective as the bar and lotion soap. And this was confirmed statistically.Eugenol has a great antibacterial action even in small concentration and t
... Show MoreIn the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.
The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show More