Addressed the problem of the research is marked (technical openness in the formation of post-modernism - Pop Art an Example) the nature of the technical expansion of the output artifacts postmodern, and the nature of the raw materials taken as components of its sensual. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. From then select the search goal (revealed openness to hire technical material in the art of Pop Art), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizing of the subject. The researcher has identified three addresses implied within this framework to ensure reading placed search according to the various frameworks tariff. Were as follows: technical introductions openness in modern art/ intellectual hypothalamus of the contemporary artist/ art Pop Art: Growing concept. The third chapter is devoted to the research procedures, through the detection studied society and the selected sample of it (4works) and then specify the search tool and determine the methodology, followed by an analysis of the sample. The fourth chapter included the search results, including:1. Detection model (1) that the technique does not rely solely on the components of the artwork, but extends to include support vocabulary as a verb exterior lighting and the shadows on the wall and the ground, as well as artwork.2. Foot model (2) and sensory broker subject for human consumption and engage then as technical supply the material composition developed, represented by empty cans that line up vertically in the middle of the artwork.3. View the artist's model (3) face another technique the formation of post - modernism, like the style of printing Professional (Silk screen) to contain details of a mock life for consumers of contemporary society.4. Detection model (4) for the machine in aid implementation clearly, away from pure manual capabilities, as in the business developed from the sample (models 1, 2, 3), which adopted the role of the manual.
Objective: To study the protective eff ects of cinnamic acid on dextran sodium sulfate (DSS) induced ulcerative colitis (UC) in mice. Materials and methods. Forty adult male mice were randomLy divided into fi ve groups, control group, an induction group received 3% DSS in drinking water for 7 consecutive days. Two treatment groups received oral suspension of cinnamic acid 50 and 25 mg/kg, respectively and 3% DSS in drinking water, for 7 consecutive days. The fi nal group received oral suspension of cinnamic acid 50 mg/kg for the latter 7 days without DSS in drinking water. All the animals were euthanized on day eight. The colon of animals was extracted and divided into two sections, the middle was homogenized and biochemically analy
... Show MoreThe Central Marshes are one of southern Iraq's most important wetlands and ecosystems. A study on evaluating soil quality and water quality in terms of chemical properties at certain sites in the southern Iraqi Central Marshes has been conducted to investigate their types and suitability for enhancing the agricultural reality of most field crops. Soil and water samples were collected from 15 sites and transferred to the laboratory. In the lab, the following parameters were determined: electrical conductivity (EC), total dissolved salts (TDS), organic materials (OM), pH, gypsum, and total sulfate content (SO3). The tests conducted on the samples indicated that it could be said that the soil of the Central Marshes
... Show MoreFusarium pseudograminearum and Fusarium graminearum commonly cause crown rot (FCR) and head blight (FHB) in wheat, respectively. Disease infection and spread can be reduced by the deployment of resistant cultivars or through management practices that limit inoculum load. Plants deficient in micronutrients, including zinc, tend to be more susceptible to many diseases. On the other hands, and zinc deficiency in cereals is widespread in Australian soils. Zinc deficiency may have particular relevance to crown rot, the most important and damaging Fusarium disease of wheat and barley in Australia. Four wheat genotypes; Batavia, Sunco and two lines from the International Maize and Wheat Improvement Center (CIMMYT) were tested for response
... Show MoreThrough an experimental program of eighteen specimens presented in this paper, the bond strength between reinforcing bar and rubberized concrete was produced by adding waste tire rubber instead of natural aggregate. The fine and coarse aggregate was replaced in 0%, 25%, and 50% with the small pieces of a waste tire. Natural aggregate replacement ratio, rebar size, embedded rebar length, the rebar yield stress of rebar, cover, and concrete compressive strength were studied in this investigation. Ultimate bond stress, bond stress-slip response, and failure modes were presented. The experimental results reported that a reduction of 19% in bond strength was noticed in 50% replaced rubberized concrete compared with convention
... Show MoreThe aim of this study is to compare and contrast the science process skills (SPS) included in the 10th-12th grade physics textbooks content utilized in Yemeni schools. The study revealed weaknesses and strengths in the textbooks’ content. For instance, a number of science process skills (SPS), such as measuring, predicting and hypothesizing, have been neglected in the 11th grade textbook. For all three textbooks content, the maximum percentage of basic science process skills (BSPS) was devoted to observation. However, the maximum percentage of integrated science process skills (ISPS) was different for each grade: experimenting had the highest percentage for 10th grade, interpreting data for 11th grade, and operational definitions for 12th
... Show MoreThe current study aimed to detect the effect of gentamicin stress on the expression of hla (encodes hemolysin) and nuc (encodes nuclease) genes of Staphylococcus aureus. Fifty-eight isolates identified as S. aureus were isolated locally from different clinical specimens. Disk diffusion method was used to detect the resistance to S. aureus. The minimum inhibitory concentration (MIC) of gentamicin was estimated by broth microdilution method. hla and nuc genes were determined by polymerase chain reaction technique. The biofilm was evaluated using the microtiter plate method in the presence and absence of gentamicin at sub-MIC. The results showed that 18 (31%) and 40 (69%) S. aureus isolates were sensitive and resistant to gentamicin, respectiv
... Show MoreIn the years recently city planning projects have been confirmed sustainable high concentration on planning streets and pedestrian paths being the most prominent component of the urban structure in the city and these me and diverse departments link the city’s sectors and serve as a space for economic, service, and social activities. On the other hand, pedestrian traffic is an essential component of the various means of transportation within the city. Suffer cities in the Middle East and Arab cities in particular are neglecting pedestrian paths in the vital urban environment. Vehicle control mechanisms on roads, and changing the uses of pedestrian paths as result of encroaching on the sidewalks designated for pedestrians. Which leads to a
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More