Addressed the problem of the research is marked (technical openness in the formation of post-modernism - Pop Art an Example) the nature of the technical expansion of the output artifacts postmodern, and the nature of the raw materials taken as components of its sensual. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. From then select the search goal (revealed openness to hire technical material in the art of Pop Art), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizing of the subject. The researcher has identified three addresses implied within this framework to ensure reading placed search according to the various frameworks tariff. Were as follows: technical introductions openness in modern art/ intellectual hypothalamus of the contemporary artist/ art Pop Art: Growing concept. The third chapter is devoted to the research procedures, through the detection studied society and the selected sample of it (4works) and then specify the search tool and determine the methodology, followed by an analysis of the sample. The fourth chapter included the search results, including:1. Detection model (1) that the technique does not rely solely on the components of the artwork, but extends to include support vocabulary as a verb exterior lighting and the shadows on the wall and the ground, as well as artwork.2. Foot model (2) and sensory broker subject for human consumption and engage then as technical supply the material composition developed, represented by empty cans that line up vertically in the middle of the artwork.3. View the artist's model (3) face another technique the formation of post - modernism, like the style of printing Professional (Silk screen) to contain details of a mock life for consumers of contemporary society.4. Detection model (4) for the machine in aid implementation clearly, away from pure manual capabilities, as in the business developed from the sample (models 1, 2, 3), which adopted the role of the manual.
The current study aimed to examine the histomorphological features of the oral salivary ducts and the peacock tongue (Pavo cristatus) of this species. In this study, eight healthy adult peacocks were used after collecting them from a commercial market in Baghdad to investigate and describe the tongue in these bird species. After being euthanized, they were killed by cutting off the major neck blood vessels and bleeding until death; the tongue was identified. The tongue was the sharp end, elongated, somewhat triangular, and measured 8.2 mm. The apex, trunk, and base are its three sections. There are 4 to 5 layers of big conical papillae on the area where the root and body converge. Without gustatory papillae, the dense keratinized ep
... Show MoreThe present study was included the isolation of Keratinophilic fungi from water samples taken from 19 indoor public swimming pools in Baghdad during four season (summer ,fall ,spring ,and winter). Isolation period was September 2011and September 2012 . Samples were collected from different places in swimming pool . Sixteen keratinophilic fungal species, belonging to twenty –one genera were isolated using Surface Dilution Plating (SDP) and Hair Bait Technique (HBT) . Aspergillus genus was the most frequent and occurrence (19.84%), followed by Trichophyton (11.60%) and Fusarium (7.59% ) . The most common fungal infection occurred in summer season (42.16%) , and the most frequent month manifestation of species occurred in August
... Show MoreMedia has become a common platform for communication as a tool of offense. English language has many insult words which are commonly used in the world of media. This study investigates the socio-pragmatic aspect of insulting in English news. It aims at identifying and analysing insult words and expressions used by news presenters. To specify the problem of the study, language has a harmful power that hurts the addressees and seriously harm their psychological well-being. The insulting words that are an element of all human languages are the source of this abusive power. The study questions sought to find out are if news presenters use insult words, which insult words, and in what social contexts. In this study, the descriptive method is use
... Show MoreThe excessive and prolonged use of any relevant material is known as substance abuse. The study’s objective is to determine the epidemiology of substance abuse’s growth in Iraq over the 4 years between 2020 and 2023.
A retrospective study was applied for the purpose of collecting the sample, as the study was epidemiological and related to substance abuse among Iraqis for 4 years from the beginning of 2020 to 2023. Participants’ data were collected from records that were available in the Iraqi Ministry of Health and Environment
As cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreTheoretical and experimental investigations of free convection through a cubic cavity with sinusoidal heat flux at bottom wall, the top wall is exposed to an outside ambient while the other walls are adiabatic saturated in porous medium had been approved in the present work. The range of Rayleigh number was and Darcy number values were . The theoretical part involved a numerical solution while the experimental part included a set of tests carried out to study the free convection heat transfer in a porous media (glass beads) for sinusoidal heat flux boundary condition. The investigation enclosed values of Rayleigh number (5845.6, 8801, 9456, 15034, 19188 and 22148) and angles of inclinations (0, 15, 30, 45 and 60 degree). The numerical an
... Show More