The research addresses the feminist lament and its representations in the contemporary Arab theatrical text as one of the purposes of the Arabic poetry and its images, samples, and reasons developed and its incentives multiplied through different time periods in which a dramatic image and representations have been manifested that harmonized with the art of theatre. In order to shed light on these representations, this study has come to look for the representations of lament phenomenon in the Arab theatre texts.
The study consists of an introduction in which the two researchers put forward the research problem, significance and objectives, and a theoretical framework which tackles a theoretical foundation for the research consisting of two sections: the feminist lament a historical view and the second section: lament in the theatre. The two researchers came up with a set of indicators adopted in the analysis of the research sample which was determined by (Al-Khansaa') play by the writer (Mohamed Saleh Ramadan) which agrees with the research objective. After the analysis, the researchers reached at a set of results among them: most of Al-Khansaa' lament is represented by mourning the dead and embodying them through images of sadness and grief.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe current theoretical research targeted to construct a model of terrorist personality and its differentiation from psychopathic personality . Several assumptions or theories of perspectives of psychopathic personality have been compared with the terrorist personality studies that concerned . The suggested theoretical model is interrupting the terrorist personality . The conclusions , discussions are mentioned. Finally, recommendation is suggested .
The objective of this article is to delve into the intricate dynamics of marriage relationships, exploring the impact of emotions such as fear, love, financial considerations and likability. In our investigation, we adopt a perspective that acknowledges the nonlinear nature of interactions among individuals. Diverging from certain prior studies, we propose that the fear element within the context of marriage is not a singular, isolated factor but rather a manifestation resulting from the amalgamation of numerous social issues. This, in turn, contributes to the emergence of strained and unsuccessful relationships. Unlike conventional approaches, we extensively examine the conditions essential for the existence of all socially signifi
... Show MoreOne of topics that occupied alarge area in Iraqi society at the moment is the issue( of tribal separation and its relation to the organization of the community ) so we see in the civilizations and heritage of each community aset of provisions and laws that take the form of status customary or religious it is indicative of the great interest in Iraqi society in cotrolling the behavior of individuals to comply with values and social laws and become their behavior is consistent with the behavior of the total and adhere to the social values and be productive individuals within the subject and this can only be achieved from the social co
... Show MoreMonitoring lotic ecosystems is vital for addressing sustainability issues. The Al-Shamiyah River is the primary source of water for various daily activities in the Al-Shamiyah district. This study assessed the pollution levels of the river by measuring the concentration and distribution of heavy metals—specifically chromium, cadmium, manganese, copper, zinc, and lead—in both the river's water and sediments. The concentrations of heavy metals in the water ranged from 0.05 to 1.44µg/ L for copper (Cu), 1.57 to 7.25µg/ L for manganese (Mn), 0 to 1.7µg/ L for cadmium (Cd), 0.02 to 1.33µg/ L for lead (Pb), 0.08 to 2.74µg/ L for zinc (Zn), and 0.44 to 1.84µg/ L for chromium (Cr). In the particulate phase, the concentrations ranged from
... Show MoreThe goal of current research to the definition of environmental awareness in the curriculum and its role in sustainable environmental planning, was the research community official regular educational schools (kindergarten, primary, secondary) for the province of Baghdad - Iraq, the sample consisted search of (100) teacher and a teacher, and what research was descriptive analytical, researchers have selected the right tool for the research procedures (closed) questionnaire, distributed to the research sample, has been used by researchers appropriate statistical methods for procedures including: the weighted average extraction unit paragraph,
... Show Moreاشكالية بناء ثقافة مشاركة في الوطن العربي