Many critics suggest that Beckett’s early plays are comic because they focus their analyses on the use comic elements. Waiting for Godot is one of Beckett’s early plays, and it has been heavily analyzed and read as a comic text partly because its subtitle is “a tragicomedy in two acts” and also because of the comic techniques used in the play. The present paper, however, attempts to read the play as a piece in which comedy fails to produce any effects on the characters who remain apparently very desperate and frustrated throughout the play. The characters perform different comic acts, but they do not really feel amused or entertained. The paper suggests that the acts these characters put on stage are only means to pass time and avoid thinking about their predicament. The paper thus does not reject the comic reading of the play, but consider it a partial reading that does not capture the different dimensions of this text.
The energy expectation values for Li and Li-like ions ( , and ) have been calculated and examined within the ground state and the excited state in position space. The partitioning technique of Hartree-Fock (H-F) has been used for existing wave functions.
Surface modeling utilizing Bezier technique is one of the more important tool in computer aided geometric design (CAD). The aim of this work is to design and implement multi-patches Bezier free-form surface. The technique has an effective contribution in technology domains and in ships, aircrafts, and cars industry, moreover for its wide utilization in making the molds. This work is includes the synthesis of these patches in a method that is allow the participation of these control point for the merge of the patches, and the confluence of patches at similar degree sides due to degree variation per patch. The model has been implemented to represent the surface. The interior data of the desired surfaces designed by M
... Show Morepublishing has become a large space in the field of interactive education and modern pages have become dedicated to the service of the educational effort in this area as the research in this context of the urgent scientific necessities, especially as we consider in Iraq from the new countries in the exploitation of these new technologies and investment possibilities of the information network And the contents of different in the framework of so-called distance education Here lies the problem of research in the possibility of finding scientific solutions for the design of interactive inter active website for students of the preparatory stage in Iraq and to find out the scientific ways to find design The study, which included the problem of
... Show MoreReduction has been linked visually in art since man began making functional and aesthetic forms, and this beginning can be identified with cave paintings. Reduction is one of the clearest indications of intellectual presence in aesthetic experience. Modernism was greatly supported by the great transformations that the intellectual movement witnessed in the world in general and in Europe in particular. There, and their transfer of European artistic experiences, and the reflection of this influence in their aesthetic sculptures, and for this reason the researchers find that the study of the aesthetic references of the reductive forms in the Iraqi sculptural experience represents a great importance in the study of the history of contem
... Show MoreConstruction is a complicated process that takes place in an almost uncontrollable environment. Although projects can be carefully planned in advance in principle, there is a chance that unforeseen events and crises can disrupt these plans, affecting project development. Because the initial investment expenditures in construction projects are so large, they may be quickly influenced by crises, resulting in significant financial losses. The 2014 financial crisis was one of the most prominent crises that Iraq faced, which significantly impacted various activities in general and the construction industry in particular. Despite the importance of crisis management systems, the researchers found a great lack of local studies looking at cr
... Show MoreExtracting, studying and interpreting the morphological database of a basin is a basic building block for building a correct geomorphological understanding of this basin. In this work, Arc GIS 10.8 software and SRTM DEM satellite images were used. The principle of data integration was adopted by extracting the quantitative values of the morphometric characteristics that are affected by the geomorphological condition of the studied basin, then eliciting an optimal conception of the geomorphological condition of the basin from the meanings and connotations of these combined transactions. Hypsometric integration was extracted for each region in the basin separately with the value of integration of the plot curve for the relative heights of
... Show MoreSurvivin, a member of inhibitor of apoptosis family is increasingly used as a target for cancer therapy design because it has a key role in cell growth and inhibition of cell apoptosis. Also it can be used as a biomarker for targeting cancer because it is found in almost all cancer but not normal cells. Our strategy was to design (computationally) a molecule to be used as survivin inhibitor. This molecule was named lead10 and was used furthermore to find (virtually) existing drugs with a good survivin inhibition activity.
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More