The research addresses the feminist lament and its representations in the contemporary Arab theatrical text as one of the purposes of the Arabic poetry and its images, samples, and reasons developed and its incentives multiplied through different time periods in which a dramatic image and representations have been manifested that harmonized with the art of theatre. In order to shed light on these representations, this study has come to look for the representations of lament phenomenon in the Arab theatre texts.
The study consists of an introduction in which the two researchers put forward the research problem, significance and objectives, and a theoretical framework which tackles a theoretical foundation for the research consisting of two sections: the feminist lament a historical view and the second section: lament in the theatre. The two researchers came up with a set of indicators adopted in the analysis of the research sample which was determined by (Al-Khansaa') play by the writer (Mohamed Saleh Ramadan) which agrees with the research objective. After the analysis, the researchers reached at a set of results among them: most of Al-Khansaa' lament is represented by mourning the dead and embodying them through images of sadness and grief.
Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreBuilding a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro
... Show MoreRice (Oryza sativa) is a fundamental food for the majority of world population. Cyclin Dependent Kinase -A (CDKA) accelerates transition through different stages of cell cycle and contributes in gametes formation. In the present investigation, a CDKA encoding gene along with the corresponding protein were characterized in O. sativa Indica Group, O. glaberrima, O. barthii, O. brachyantha, O. glumipatula, O. longistaminata, O. meridionalis, O. nivara, O. punctata and O. rufipogon using in silico analyses. The results reflected little variation in most species except O. longistaminata and O. brachyantha. Compared with the remaining species, O. longistaminata
... Show MoreContemporary Media Stylistics permits readers to explore a variety of methodological applications to data analysis. Recent developments in technology and media communication provide linguists and stylisticians with authentic data for analysis based on real-life communication.
The typographic accomplishment is the most important means of cognitive communication and carries a message from the sender to the recipient which serves a certain objective functionally, economically and advertisingly.
The design of typographic accomplishment depends on two different techniques, the first is manual, which depends on the skill, training and individual achievement of the designer and his ability to design and produce typographic accomplishment with manual skill effects. The second one is the contemporary digitization which is represented by computers, programs and printers attached to them. The problem of the current resear
... Show MoreThe nation-building process in fragile states is complex, often involving multifaceted challenges and opportunities. A pertinent example is Iraq post-2003, which serves as a model to study the intricacies of rebuilding a nation in the aftermath of conflict. During this period, we witnessed a significant international intervention aimed at establishing democratic governance, fostering economic development, and restoring social stability. Iraq’s nation-building journey showcases both successes and shortcomings. Establishing a representative government marked a step towards inclusivity and political participation, yet sectarian tensions persisted, hindering cohesive national identity. Economic initiatives aimed to harness Iraq's oil resou
... Show MoreThe novel has recently received great attention from readers and before them writers, due to the role it is playing, and this indicates an important rule, which is whenever there is art or creativity, there must be a criticism of its own, and this criticism is certainly no less important than its owner, so we find There are critics who have their distinguished literary position in following up the narrative development, and trying to describe the transformation of its elements, including Professor Fadel Thamer, and whoever wants to approach an element of the novel as an explorer, he must stand on the visions of this critic about it, and this is what made us take the element (personality) Tracking the most important opinions of the critic
... Show MoreNovel has recently received the attention of readers and writers greatly, because of the role they play, and this indicates an important rule, which is whenever there is an art or creativity, there must be a respective criticism, and this criticism is certainly not less important than the author. So there are critics who have a prestigious literary position in the follow-up story development, and trying to describe the transformation of its elements. One of these critics is professor Fadhel Thamer, and who wants to approach one of the elements of the novel exploring, must stop on the visions of this critic about it , and that’s why we take the (character) element following the most important opinions of this critic about
... Show More