The following research has been dealing ( Undermining Humanism in Foucault's thought and its implications in the pop art. meanings and facts which become in the process of the post-modernist.So the research's problem is to ask for undermining Humanism in Foucault's thought and how it formed through the formality of processors and the technical and stylistic and contents in pop art.. How are these technical aspects interact with each other to undermine the humanism in Foucault's mind and with system humanity, intellectual and social relations in the post-modern society . The contents of the first chapter, is the aim of the research, which aims to undermine know humanism in Foucault's mind and its implications in pop art , within the limits of contemporary fine art in Europe and America during the (1965) to (1999)
Then included second chapter on the theoretical framework, the theoretical framework contains three sections: the first of which dealt with undermine humanism at the mind of post- modernism, while the second section included: undermine humanism at the Foucault's mind and the third section explained the undermine humanism in pop art.
The third chapter has dealt with research procedures, hence the spam of the research community, the researcher has obtained only (50) only work of this community the research sample has chosen in deliberate way according to a group of justifications and it determined by (5) models for the research sample and the researcher adopted at the analysis of the sample models on the descriptive approach and with style of content analysis and this chapter has also included build the mean in its initial and final way. While the fourth chapter included the results of the research and its conclusions , in addition to proposals and recommendations . Among the most results findings by the researcher :
1.Undermined with disassembly are matching by undermining human , killed him and tortured him and this is a real summary exercised its presence in contemporary life, and this represents a metaphor of what disappears behind the
masks, It is the silence , meaninglessness and passivity to the pain and violence of Western society and all this relates to ( Foucault 's) mind , who wanted to undermine human and marginalized and .( this in turn appeared in pop art and reflected in the models (1, 5)
Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh
... Show Moreأدوات الىفي الذاخلة على الجملة التحويلية الاسمي
Autonomous motion planning is important area of robotics research. This type of planning relieves human operator from tedious job of motion planning. This reduces the possibility of human error and increase efficiency of whole process.
This research presents a new algorithm to plan path for autonomous mobile robot based on image processing techniques by using wireless camera that provides the desired image for the unknown environment . The proposed algorithm is applied on this image to obtain a optimal path for the robot. It is based on the observation and analysis of the obstacles that lying in the straight path between the start and the goal point by detecting these obstacles, analyzing and studying their shapes, positions and
... Show MoreEpistemological skepticism was present strongly in the Islamic
philosophical heritage. Many texts were received by thinkers and
philosophers calling for
Piracy is one of the most important problems faced by sound record producers, because it is a problem that technology, evolves with the development of time and and although piracy is not a new problem, it has received great attention in recent years, because of the means by which (the Internet) and its size result from it, even In many of the ruler, describing it as (the crime of nd she participated in the great the electronic age) aharm it causes to all the groups involved in it producing the sound recording, because there are three categories that contribute to the production of the sound recording, which is (the author of the recorded work, the st who performs the work and the producer who artiperforms an operation Performance recording
... Show Moreيهدف البحث إلى دراسة التحفظات على اتفاقية سيداو (الدول العربية أنموذجًا)، حيث يُعد نظام التحفظ على الاتفاقيات الدولية أحد المظاهر القانونية الحديثة في مجال العلاقات الدولية، والذي يقرّ بحق الدول في إبداء التحفظ على بعض أحكام الاتفاقيات الدولية، وفقًا للأحكام العامة التي حددتها المواد (19-23) من اتفاقية فيينا لقانون المعاهدات لعام 1969. وإذا كان حق الدول في التحفظ مكفولًا دوليًا، فإن الإشكالية القانونية تكمن في
... Show MoreThis research aims to invest qur›anic words referring to lie in media language. The researcher has chosen a set of qur›anic words functioning as «lie».
It is an attempt to review the media language which is used to make use of repetition of terms and templated which make it weak and ineffective language. The use of qur›anic texts and terms according to the semantic field for each topic will give this media language an opportunity for growth, development and stability.
This researcher identifies a number of words to study them in the light of their lexical meaning using the Dictionary of Language Standards by Ibn Fares as it focuses on the general meaning of the root language. He also uses the Dictionary of the Basis of Rhe
Czerwi’nski et al. introduced Lucky labeling in 2009 and Akbari et al and A.Nellai Murugan et al studied it further. Czerwi’nski defined Lucky Number of graph as follows: A labeling of vertices of a graph G is called a Lucky labeling if for every pair of adjacent vertices u and v in G where . A graph G may admit any number of lucky labelings. The least integer k for which a graph G has a lucky labeling from the set 1, 2, k is the lucky number of G denoted by η(G). This paper aims to determine the lucky number of Complete graph Kn, Complete bipartite graph Km,n and Complete tripartite graph Kl,m,n. It has also been studied how the lucky number changes whi
... Show Moreافرض ان (X1, X2, …. , Xn) هي عينة عشوائية من توزيع له دالة احتمالية الكثافة . المثال المعتاد في مثل هكذا تقدير للامكان الاعظم (MLE) هو ليس وحيد باخذ ليكون كثافة منتظمة عليه، مثل .
انظر [Bicked and Doksum (1977, P111)] او [Hogg and Craig (1978, P(207)] بالاضافة الى احضار بعض الامور غير الطبيعية.
... Show MoreThis work includes design, implementation and testing of a microcontroller – based spectrum analyzer system. Both hardware and software structures are built to verify the main functions that are required by such system. Their design utilizes the permissible and available tools to achieve the main functions of the system in such a way to be modularly permitting any adaptation for a specific changing in the application environment. The analysis technique, mainly, depends on the Fourier analysis based methods of spectral analysis with the necessary required preconditioning processes. The software required for waveform analysis has been prepared. The spectrum of the waveform has been displayed, and the instrument accuracy has been checked.
... Show More