Sam Shepard is considered as one of the modern American playwrights who combined the individual and the social in his plays to draw an image of a postmodern American society, and American family in particular by focusing on uniquely American aspects of culture. He is concerned with the individual in America rather than the institution. Shepard investigates, in almost all of his plays, the functions and dysfunctions of his characters, as well as the connections of individuals within the context of the family system and other social structures. The majority of his plays center on the struggle and conflict that occurs between father and son, husband and wife, and brother and brother as they strive for supremacy or for survival in a fractured society. This theme can be found at the heart of all of his works. In addition, his protagonists have a propensity to be cut off from the rest of their society and to experience a sense of disintegration as a result of living in a society that is being ravaged by war and the rise of capitalism. His protagonists typically awaken to the realization that this sense of destruction has shaped their lives and become the primary obstacle that prevents them from leading a normal life. This paper discusses Sam Shepard’s play States of Shock as an anti-war work in which the playwright portrays American individuals who are traumatized, physically and psychologically, by war that left them fragmented in their own society.
We study in this paper the composition operator that is induced by ?(z) = sz + t. We give a characterization of the adjoint of composiotion operators generated by self-maps of the unit ball of form ?(z) = sz + t for which |s|?1, |t|<1 and |s|+|t|?1. In fact we prove that the adjoint is a product of toeplitz operators and composition operator. Also, we have studied the compactness of C? and give some other partial results.
Coffee is the most essential drink today, aside from water, the high consumption of coffee and the byproducts of its soluble industries such as spent coffee grounds can have a negative effect on the environment as a source of toxic organic compounds. Therefore, caffeine removal from the spent coffee ground can be applied as a method to limit the effect of its production on the environment. The aim of this study is to determine the kinetics and thermodynamics parameters and develop models for both processes based on the process parameters by using traditional solid-liquid extraction and Ultrasound-assisted extraction methods. The processes were performed at a temperature range of 25 to 55 °C for traditional and ultrasound baths, and
... Show MoreIn this research constructed N2 laser system by use developed method of electric discharge. In this method used four step of electric discharge by using four capacitors, three spark gaps, high tension power supply varying in range from 12kV to 24 kV and three resistors, this method called three stage blumlein circuit. The breakdown time delay of these parallel spark gaps cement strong ultraviolet preionization in the laser channel, thus the result of these amendments the laser output is many doubled and is more increasing than that obtained using the one and two stage blumlein circuits. This system has been designed and operated to give pulse laser with wavelength at 337.1 nm. This laser system can operate without mirrors and optical res
... Show MoreAfter the year 2003 terrorist attacks knock Baghdad city capital of Iraq using bomb explosion various, shook the nation, and made public resident of Baghdad aware of the need for better ways to protect occupants, assets, and buildings cause the terrorist gangs adopt style burst of blast to injury vulnerability a wider range form, and many structures will suffer damage from air blast when the overpressure concomitant the blast wave, (i.e., the excess over the atmospheric pressure 14.7 pounds per square inch at standard sea level conditions are about one-half pound per square inch or more(
to attainment injury. Then, the distance to which this overpressure level will extend depends primarily on the energy yield (§1.20) of the burst of
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreWe investigate mathematical models of the Hepatitis B and C viruses in the study, considering vaccination effects into account. By utilising fractional and ordinary differential equations, we prove the existence of equilibrium and the well-posedness of the solution. We prove worldwide stability with respect to the fundamental reproduction number. Our numerical techniques highlight the biological relevance and highlight the effect of fractional derivatives on temporal behaviour. We illustrate the relationships among susceptible, immunised, and infected populations in our epidemiological model. Using comprehensive numerical simulations, we analyse the effects of fractional derivatives and highlight solution behaviours. Subsequent investigatio
... Show More