The following research has been dealing ( Undermining Humanism in Foucault's thought and its implications in the pop art. meanings and facts which become in the process of the post-modernist.So the research's problem is to ask for undermining Humanism in Foucault's thought and how it formed through the formality of processors and the technical and stylistic and contents in pop art.. How are these technical aspects interact with each other to undermine the humanism in Foucault's mind and with system humanity, intellectual and social relations in the post-modern society . The contents of the first chapter, is the aim of the research, which aims to undermine know humanism in Foucault's mind and its implications in pop art , within the limits of contemporary fine art in Europe and America during the (1965) to (1999)
Then included second chapter on the theoretical framework, the theoretical framework contains three sections: the first of which dealt with undermine humanism at the mind of post- modernism, while the second section included: undermine humanism at the Foucault's mind and the third section explained the undermine humanism in pop art.
The third chapter has dealt with research procedures, hence the spam of the research community, the researcher has obtained only (50) only work of this community the research sample has chosen in deliberate way according to a group of justifications and it determined by (5) models for the research sample and the researcher adopted at the analysis of the sample models on the descriptive approach and with style of content analysis and this chapter has also included build the mean in its initial and final way. While the fourth chapter included the results of the research and its conclusions , in addition to proposals and recommendations . Among the most results findings by the researcher :
1.Undermined with disassembly are matching by undermining human , killed him and tortured him and this is a real summary exercised its presence in contemporary life, and this represents a metaphor of what disappears behind the
masks, It is the silence , meaninglessness and passivity to the pain and violence of Western society and all this relates to ( Foucault 's) mind , who wanted to undermine human and marginalized and .( this in turn appeared in pop art and reflected in the models (1, 5)
Archives of Razi Institute (ARI)
With the growing number of Internet users, public and private arts activities have become increasingly popular. Adolescents have begun to establish aesthetic taste and new cultural values. This category is the most affected one by the published images and ideas especially in the social networking space and specifically the Facebook. It is the most important problem in their cultural composition. This research aims to detect the problems of social networking sites in nurturing the aesthetic taste of adolescents. The researcher used the analytical descriptive approach to obtain accurate information describing the current situation or depicting the social reality of adolescents. The research concluded that the public discourse in social med
... Show MoreIntroduction: Different surgical techniques used for closure of various oral defects. While each one of these techniques has its limitation; the buccal pad of fat used in last quarter of last century as pedicle or free graft in reconstruction of small to medium, congenital and acquired defects showed good potentials for success. The present study used the BPF as pedicled flap to reconstruct intra oral defects. The study aimed to evaluate of the success of buccal pad of fat pedicled flap in the reconstruction of intra oral defects. Outlining its indications, limitations and complications. Materials and Methods: The study included 19 patients (17 males and 2 females) with age range between (1- 70 years), all patients were treated with pedic
... Show MoreEmotional blackmail is generally defined as manipulating others' emotions for personal gain. It is a type of manipulation that damages healthy relationships among people and turns them into toxic relations leaving the victim in a state of depression and under stress of losing something s/he holds dear. This study aims to identify the pragmatic techniques of emotional blackmail used by both blackmailers and victims in "No One Would Tell" (2018). To do so, the researchers developed an eclectic model comprising Forward and Frazier's (1997) emotional blackmail, Searle’s speech acts (1979), Brown and Levinson’s politeness strategies (1987), Culpeper’s impoliteness strategies (1996, 2005), and Mayfield's taxonomy of fallacy (2007)
... Show MoreThe effect of 0.662MeV gamma radiation on the optical properties of the CdTe thin films was studied. 300nm thickness of CdTe samples were irradiated with doses (10, 20, 30,60krad) in room temperature. The absorption spectra for all the samples were recorded using UV- Visible spectrometer in order to calculate the energy gap, width of localized states and optical constants(refractive index, extinction coefficient, real and imaginary parts of dielectric constant). The optical energy gap was found to decrease from (1.53 to 1.48 eV), while the width of localized states increased from (1.34 to 1.49 eV) with the increasing of radiation dose. The behavior of energy gap with the irradiation dose makes the material a good candidate for dosimetry
... Show MoreIn this work, a simple and very sensitive cloud point extraction (CPE) process was developed for the determination of trace amount of metoclopramide hydrochloride (MTH) in pharmaceutical dosage forms. The method is based on the extraction of the azo-dye results from the coupling reaction of diazotized MTH with p-coumaric acid (p-CA) using nonionic surfactant (Triton X114). The extracted azo-dye in the surfactant rich phase was dissolved in ethanol and detected spectrophotometrically at λmax 480 nm. The reaction was studied using both batch and CPE methods (with and without extraction) and a simple comparison between the two methods was performed. The conditions that may be affected by the extraction process and the sensitivity of m
... Show MoreHumor is an interesting phenomenon that has been studied widely, yet it is considered a universal trait that cannot be an old subject for a study. This study is conducted to investigate humor from a universal pragmatic lens in a stand-up comedy show, namely, You Wanna Hear Something Crazy?. It aims to study humor as a coin with two sides, the production side and the understanding side. To achieve the aim of the study, the researchers use an eclectic contains Grice’s CP model (1975) and Habermas’s UP model (1979, 1984, 1987, 1998). The study has noted that while using the observance and the non-observance of the cooperative maxims to produce humor, the universal validity claims of truth, sincerity, and normative rightness for rea
... Show MoreLying is a controversial issue as it is closely related to one's intended meaning to achieve certain pragmatic functions. The use of lying in literary works is closely related to the characters’ pragmatic functions as in the case of Miller's The Crucible where it is used as a deceptive complex phenomenon that cannot be observed out of context. That is, the use of lying as a deceptive phenomenon represents a violation to Grices's Maxims. Thus, the study aims to qualitatively examine the kinds of maxims being violated, the kinds of violations conducted, the strategies followed in the violations, and the pragmatic functions behind such violations across the different categories of lies. To this end, the (30) extracts fou
... Show MoreThis abstract focuses on the significance of wireless body area networks (WBANs) as a cutting-edge and self-governing technology, which has garnered substantial attention from researchers. The central challenge faced by WBANs revolves around upholding quality of service (QoS) within rapidly evolving sectors like healthcare. The intricate task of managing diverse traffic types with limited resources further compounds this challenge. Particularly in medical WBANs, the prioritization of vital data is crucial to ensure prompt delivery of critical information. Given the stringent requirements of these systems, any data loss or delays are untenable, necessitating the implementation of intelligent algorithms. These algorithms play a pivota
... Show More