The Iraqi and Iranian pottery has a significant role in the contemporary world pottery space, despite the fact that influences created those formulation, thus the researcher supposes that there is a relation between the potter and his environment within Iraq's environment and Iran's environment, which are similar at times and different at other times. The researcher, hence, found himself in front of a number of questions:
1- How much was the Iraqi potter inspired by the environment compared to the Iranian potter?
2- Has the Iraqi and Iranian pottery been really inspired by the environment items or there were modified metaphors?
The current research aims at (identifying the influential environmental characteristics in the Iraqi and Iranian contemporary pottery).
The research community consists of two groups of artistic works that are subject to the study. The first is the Iraqi research community which consists of contemporary pottery works of the artist Saad Shakir, as a model, and the second is the Iranian research community which consists of the pottery works of the Iranian artists Muhammed Madhi Anooshqar as a model. The researcher analyzed two samples of the works of the potters and came up with important results including:
1- The Iraqi contemporary artist, by means of investigation and experimentation, was able to establish artistic and aesthetic data, by drawing inspiration from the cultural heritage with a contemporary spirit and style as in the model (1).
2-the richness of the cultural heritage was evident in the Iraqi artistic achievement due to the seniority of the Iraqi civilization, with a shortcoming in the Iranian side as shown in model (1).
The objective of the study is to study how to employ performance evaluation in achieving organizational integrity and the impact of performance evaluation on achieving organizational integrity. In light of this, the following questions were raised:
Are the dimensions of organizational integrity available in the field in question?
In order to answer the research questions, a questionnaire questionnaire was distributed to the sample of 30 members of the teaching staff at the Technical Institute in Mosul. The three-dimensional Lycert scale was used. The statistical methods were used, ie, the frequency distribution, the computational circles, the standard deviations, Pearson), simple
... Show MoreA finite element is a study that is capable of predicting crack initiation and simulating crack propagation of human bone. The material model is implemented in MATLAB finite element package, which allows extension to any geometry and any load configuration. The fracture mechanics parameters for transverse and longitudinal crack propagation in human bone are analyzed. A fracture toughness as well as stress and strain contour are generated and thoroughly evaluated. Discussion is given on how this knowledge needs to be extended to allow prediction of whole bone fracture from external loading to aid the design of protective systems.
Lactobacillus Plantarum and Lactobacillus rhamnosus GG were encapsulated using 3% of alginate via extrusion technique. And the probiotics capsules produced were further coated used 1% chitosan to increase the survival of probiotics, and evaluation of The heat resistance of the slow pasteurization and fast pasteurization for Lb,pla and Lb.GG for control and bacteria coated one layer and bacteria coated two layer at 63°C/ 30 minutes and 72°C/ 15 seconds. The results indicate that the Probiotic coated two layer are more resistant to pasteurization temperatures at 63°C/ 30 minutes and 72°C/ 15 seconds than the Probiotic coated one layer. While the results of the control follow a significant reduction for viability of cell toward pasteuri
... Show MoreLeiomyosarcoma (smooth muscle tumor) is a rare type of a malignant neoplasm of smooth
muscle. It is a resistant cancer, generally not very responsive to chemotherapy, radiationand surgery.The
aim of this study was to evaluate photodynamic therapy (PDT) as a possible basis for treatment using
(650 nm)diode laser with methyleneblue (MB) as a photosensitizer on leiomyosarcoma (LMS)cell line
(L20B) in vitro. The cytotoxic effects of 650nm diode laser 0.052 W/cm2 (power density) at different
exposure time (10, 20, and 30 min) with methylene blue at different concentrations (0.01% ,0.1 % ,1%)
was investigated on LMS cell line (L20 B). The cytotoxic effect of laser was increased with increasing
irradiation time for a certai
his project try to explain the using ability of spatial techniques for land cover change detection on regional level with the time parameter and did select for explain these abilities study case (Hewaizah marsh ) . this area apply to many big changes with the time. These changes made action on characters and behaviors of this area as well as all activities in it . This Project concerting to recognize the Using importance of remote sensing and GIS Methodology in data collecting for the changes of land use and the methodology for the analyses and getting the results for the next using as a base data for development and drawing the plans as well as in regional planning .This project focus on practical
... Show MoreAbstract The aim of this paper is to shed light on the theme of Gender Struggle and Women’s Predicament in Tennessee Williams’ A Street Car Named Desire .The paper tries to show William's dealings with the critical social themes like Men's Brutality and women's predicament. The paper exposes the complete shift of the balance of power between the genders in America after the two world wars. Williams illustrates society’s changing attitudes towards masculinity and denounces the society's attitudes towards women in America at that time. He rebels against the cruelty of the modern age and regrets the disintegration of the values of the south and their being replaced by the disruptive forces of modern life. In the end of the play, brutalit
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More