The art of theater penetrated various scientific and human fields, as well as touching the facts and events surrounding it, and scientific innovations had a wide field, so it adopted feedback in interactive theater performances, especially the theater of the oppressed. Then came the indicators that resulted from the theoretical framework for the formation of the tool by which the research sample is analyzed, and then the chapter concluded with previous studies. As for the third chapter, it involved the research procedures, and through the research tool and the research method, and by selecting the intentional sample, the sample represented by a play (the story of Shahrour) was analyzed. As for the fourth chapter, it included the results
... Show MoreLanguage as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit
... Show MoreBN Rashid, AKF Jameel, Al- Ustath: Quarterly Scientific Journal, 2017 - Cited by 15
The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreThe study aimed to reveal the extent of the first intermediate grade science curriculum focus on the national values, health, environmental, economic values, in the light of the education policy in the Kingdom of Saudi Arabia, in addition to present a proposed vision to strengthen it in the science curriculum for the first intermediate grade. The study was applied to the two books student and the two books of activity on the first-second semesters for the academic year 1441 AH. To analyze the curriculum content, the study used a verified card prepared by the researchers and a criterion for interpreting percentages. The study reached the following results: environmental values ranked first with a concentration of (43%), i.e. with an avera
... Show MoreThis paper demonstrates the spatial response uniformity (SRU) of two types of heterojunctions (CdS, PbS /Si) laser detectors. The spatial response nonuniformity of these heterojunctions is not significant and it is negligible in comparison with p+- n silicon photodiode. Experimental results show that the uniformity of CdS /Si is better than that of PbS /Si heterojunction
Our research which is under the name "Polarization and Communication mechanism in the formation of green industrial products " The problem of the research focuses in identifying what is polarization and its function mechanisms , by displaying the inventive and creative cases of the designer in how to exploit the industrial products and its recycling process to attract the user and recipient by asserting on the values of beauty of the appearance of the industrial product with the attraction Of the user and the recipient with the new function of that product and how its different from the function achieved by the old product , with consideration of nature and its preservation . The results of the research were as following : The designer e
... Show MoreThe removal of commercial orange G dye from its aqueous solution by adsorption on tobacco leaves (TL) was studied in respect to different factor that affected the adsorption process. These factors including the tobacco leaves does, period of orange G adsorption, pH, and initial orange G dye concentration .Different types of isotherm models were used to describe the orange G dye adsorption onto the tobacco leaves. The experimental results were compared using Langmuir, and frundlich adsorption isotherm, the constants for these two isotherm models was determined. The results fitted frundlich model with value of correlation coefficient equal to (0.981). The capacity of adsorption for the orange G dye was carried out using various kinetic models
... Show More