The postmodern ideas and concepts have produced social, political and economic variables that have been affected by wars, crises, the role of globalization and the information revolution. They have created many variables in concepts and great variables in technological, artistic and cultural innovations. All these changes have contributed to changing the form of the theatrical show aesthetically and intellectually, which cast a shadow over the nature of the actor's performance who has become more demanding to change his performance and to find the mechanisms and new nature of work governing him corresponding to those variables and this prompted the researcher to adopt the subject (the performance variable of the actor's techniques in postmodern theatre show (. Research importance:It provides benefit to actors, directors and workers in the field of theater. The researcher in the theoretical framework tackled two sections:The first section: Postmodern conceptThe second section: the actor's performance in postmodernismThe researcher chose a sample for the analysis represented by the play (Azaiza), which was presented in 2014, and after the analysis, a set of results have been found and the most important of which are:- The theory of playing in the performance and performance technology clearly contributed to the blending of all the styles and artistic trends within one center that depends through their way on fragmentation, anarchy, contradiction, and the ambiguity and multiplicity of the meaning. Then the conclusions reached at and the most important of which are:-The performance variable of the actor's techniques is highlighted in postmodern presentations via subjugating the actor to the hegemony of the techniques that made him a sign subject to its authority within the show system.
Objective: To evaluate nurses' practices concerning isolation techniques for Adult Leukemic Patients (ALP).
Methodology: A descriptive study was carried out at the isolation rooms at leukemic wards in Baghdad Teaching
Hospitals, starting from Jan. 27th 2008 up to the 27th of Apr. 2008. To achieve the objectives of study, a non-probability
"purposive" sample of (50) nurse was selected out of four Teaching Hospitals in Baghdad city were selected according
to the criteria of the study sample.
The study instrument consisted of two major parts. It is based on the review of literature. First is concerned with
demographic data for nurses; and the second part is observational tool (checklist) is composed of (83) item. The conte
Hospitals are part of the service organizations and most importantly at the level of individuals because they are tied to the people health and their daily lives , the nursing service is one of the important services provided by hospitals, and nurses are the human resource that offers this service, from this standpoint the idea of research came to prepare work Scheduling for nurses in a scientific way to improve performance operational for their services and provide efficient service available 24 hours a day, the research use one of the modern and scientific rules of scheduling its “schedule of
... Show MoreMany oil and gas processes, including oil recovery, oil transportation, and petroleum processing, are negatively impacted by the precipitation and deposition of asphaltene. Screening methods for determining the stability of asphaltenes in crude oil have been developed due to the high cost of remediating asphaltene deposition in crude oil production and processing. The colloidal instability index, the Asphaltene-resin ratio, the De Boer plot, and the modified colloidal instability index were used to predict the stability of asphaltene in crude oil in this study. The screening approaches were investigated in detail, as done for the experimental results obtained from them. The factors regulating the asphaltene precipitation are different fr
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreThe performance measures and traditional methods used in management accounting is no longer able to provide convenient to evaluate the performance of economic units in the modern manufacturing environment information، and so this information is more important and feasibility must be Mistohat of all the company's activities and functions، and it is a problem Find the inadequacy of information management accounting that contribute to meet the needs of the upper levels of management to cope with the problems resulting from the increased size and complexity of the business، and lack of management accounting information and methods used in the performance evaluation، which reflected negatively on the value chain activities and then on the
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show More