Sam Shepard is considered as one of the modern American playwrights who combined the individual and the social in his plays to draw an image of a postmodern American society, and American family in particular by focusing on uniquely American aspects of culture. He is concerned with the individual in America rather than the institution. Shepard investigates, in almost all of his plays, the functions and dysfunctions of his characters, as well as the connections of individuals within the context of the family system and other social structures. The majority of his plays center on the struggle and conflict that occurs between father and son, husband and wife, and brother and brother as they strive for supremacy or for survival in a fractured society. This theme can be found at the heart of all of his works. In addition, his protagonists have a propensity to be cut off from the rest of their society and to experience a sense of disintegration as a result of living in a society that is being ravaged by war and the rise of capitalism. His protagonists typically awaken to the realization that this sense of destruction has shaped their lives and become the primary obstacle that prevents them from leading a normal life. This paper discusses Sam Shepard’s play States of Shock as an anti-war work in which the playwright portrays American individuals who are traumatized, physically and psychologically, by war that left them fragmented in their own society.
Psychosocial Alienation is a modern concept that arises from the capitalist and materialistic conceptions of individuals. The evergrowing competitive nature of domestic societies crystallised the concept in its modern form. The intensity of the rapid changes in the urbanised societies prevents the individuals from exploring their inner selves. Thus, a new generation is created with an alienation crisis which is reflected inward towards the self and outwards toward society. Alan Ayckbourn (1939), A British playwright, presents Alienated characters inspired by his life on and off stage. He explores their Alienation and their path toward recovery and self-realization. A Brief History of Women (2017) Ayckbourn explores the depth of the individu
... Show MoreSimple, sensitive and accurate two methods were described for the determination of terazosin. The spectrophotometric method (A) is based on measuring the spectral absorption of the ion-pair complex formed between terazosin with eosin Y in the acetate buffer medium pH 3 at 545 nm. Method (B) is based on the quantitative quenching effect of terazosin on the native fluorescence of Eosin Y at the pH 3. The quenching of the fluorescence of Eosin Y was measured at 556 nm after excitation at 345 nm. The two methods obeyed Beer’s law over the concentration ranges of 0.1-8 and 0.05-7 µg/mL for method A and B respectively. Both methods succeeded in the determination of terazosin in its tablets
Firstly, in this study, a brief updated description and applications of different solar collectors used in renewable energy systems for supplying electric and thermal energy was presented. Secondly, an attempt was made to utilize tilting orientation of solar collector for maximizing collector energy with time in respect to horizontal orientation. For energy calculation, global solar radiation was used since they are directly related. For that purpose, field measurements of half-hourly radiation on two flat panels of tilting and horizontal orientations were carried out throughout 8-month period under local climate of Baghdad. Then, energy gain and radiation level averages were calculated based on the field radiation
... Show MoreTwelve species from Brassicaceae family were studied using two different molecular techniques: RAPD and ISSR; both of these techniques were used to detect some molecular markers associated with the genotype identification. RAPD results, from using five random primers, revealed 241 amplified fragments, 62 of them were polymorphic (26%).
ISSR results showed that out of seven primers, three (ISSR3, UBC807, UBC811) could not amplify the genomic DNA; other primers revealed 183 amplified fragments, 36 of them were polymorphic (20%). The similarity evidence and dendrogram for the genetic distances of the incorporation between the two techniques showed that the highest similarity was 0.897 between the va
... Show MoreMany undergraduate learners at English departments who study English as a foreign language are unable to speak and use language correctly in their post -graduate careers. This problem can be attributed to certain difficulties, which they faced throughout their education years that hinder their endeavors to learn. Therefore, this study aims to discover the main difficulties faced by EFL students in language learning and test the difficulty variable according to gender and college variables then find suitable solutions for enhancing learning. A questionnaire with 15 items and 5 scales were used to help in discovering the difficulties. The questionnaire was distributed to the selected sample of study which consists of 90 (male and female) stud
... Show MoreThe aesthetic dimension in popular subjects is one of the important topics in the history and culture of peoples, as it is the vessel from which their faith, traditions, original values, language, ideas, practices and way of life are derived, which expresses their culture and national identity, and it is the bridge of communication between generations throughout the ages.
It is one of the main pillars in the process of development and development, and popular subjects have special images related to real daily life, and they are the best source for man to narrate through him in his portrayal of daily life in general, and for the artist in particular, who is part of this daily life and its vocabulary, as he interacts with it so that
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show More