eroticism formed a basic focus in contemporary studies and caused a problematic clash in terms of terminology, as some interpreted it by pornography and another interpreted it as aesthetic, so this research came to seek to decipher this terminological clash, and to be known as erotech in terms of cognitive significance, Accordingly, the research culminated in four chapters. The first chapter (Methodological Framework) talks about the research problem that came according to the following question: “How is the erotic act built in the theatrical text and what are the epistemic connotations that express its subjectivity? Then followed by the importance of research and the need for it, then the objective of the research, and the boundaries of research that were determined in time (2009) and spatially / Iraq, and objectively / about me by studying the erotica as a sign The chapter was concluded by defining the terms and defining them As for the second chapter, it consists of two researches, the first one is called: “Aerotec is an epistemic connotation” and the second is “Aerotec and its manifestations in the theatrical text.” Then the chapter was concluded with the results of the theoretical framework. ) Included On the research community, which consisted of three plays, then the research sample that was formed from a play taken from the research community by the intentional method and adopted the results of the theoretical framework as a tool for research to conclude the chapter by analyzing the research sample, then the fourth chapter came under the name of results and conclusions and the most important of these The results (the text formed an aesthetic and pictorial space, through body, the female body (Dzdemonh), and overwhelmed by the details of (Bailoger), to broadcast through his vocabulary erotica erotic sexual instinct on the tongue (Iago), and conclusions and it was the most important (try the text that gives the receiver a form aesthetically pleasing geography The female body) to conclude the research with a list of references and sources .
This study aims to impact statement played by banking governance according to the decisions of the Basel Committee in achieving the strategic objectives of the banks, But order to achieve the this goal has been the adoption of two hypotheses in addition to the two main hypotheses as sub answered preliminary The study seeks to verify their health and two (no correlation relationship and impact between Banking governance and achieve strategic objectives), has been tested hypotheses. Study has reached
... Show MorePurpose :This study seeks to provide the point of view stands on the marketing performance of the banks in the context of Dynamic Equilibrium of marketing. It aims to develop a prototype of measuring marketing performance under the umbrella of marketing dynamic prototype, embodied of the strategic alliance and competition, and the laws and legislation, and to explore any of the dimensions more effective in achieving performance. This study aims to discusses the importance of the Dynamic Equilibrium of marketing and it role in achieving the marketing performance <
... Show MoreExchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreBuilding a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro
... Show Moreبعد ثورة تموز عام 1958في العراق, لم يكن يسمح للقطاع الخاص بأن تكون له استثمارات كبيرة في القطاعات الاقتصادية. وذلك بسبب الإيديولوجيات التي كانت تؤطر الفكر السياسي. حيث كان النهج الاشتراكي هو الغالب في إدارة الأنشطة الاقتصادية. إذ قامت الدولة بتأميم معظم الاستثمارات الخاصة الكبيرة ،لاس
... Show MoreBackground: The iron deficiency anemia along with hyperphosphatemia are the main complications of dialysis patients. Traditional iron supplement has been failed to correct iron deficiency anemia, therefore, the current study aimed to investigate the efficacy and tolerability of new phosphate binder, ferric citrate, in a sample of Iraqi patients with end stage renal disease on maintenance hemodialysis. Method: Prospective, randomized, open label, active controlled trial was conducted in one center for dialysis in Babylon governance. Patients were randomized to receive ferric citrate with dose of 6 g/d and calcium carbonate with dose of 3 g/d for eight weeks. Hemoglobin concentration, mean corpuscular hemoglobin concentration and count o
... Show MoreThis paper examines the gaps in Lebanese building law as well as the exploitation of contractors, stakeholders, and residents in order to make illegal profits at the expense of The Shape of urban agglomerations and their expansion in cities and rural areas, which is contrary to the principles of sustainable land development. It also emphasizes the amplification of the factors of vertical and horizontal building investments in the implementation of buildings contrary to the license, as well as the burden that this places on the city's resulting infrastructure and ability to absorb the activities and needs of its residents. The study then presents recommendations in the process of transformation in the technique of planning and application
... Show MoreThe aim of the research is to identify the reality of strategic planning in the National Insurance Company and its importance in building institutional work and to identify the requirements that enable this company to successfully implement strategic planning and the obstacles that limit its application and then achieve the marketing objectives of this company. This study started from the fact that there is a problem represented by the main question that was stated.  
... Show More