The current research is summarized by studying and understanding the imagination and what resulted from it in postmodern arts, specifically Pop Art. The research was focused spatially (America) between the year 1950-1975 AD and it defined the research problem by asking about what factors and variables that established the social imagination in culture Al-Gharbia, which in turn crystallized the Western cultural product to appear in its form, which is historically called "pop art". Two studies were adopted in the second chapter. The first one was the cultural structure of the social imagination. The second topic was concerned with the stylistic diversity of pop art, and the third chapter included research and accreditation procedures. There are two models for determining the research sample, and the research has produced results in the fourth semester, the most important of which are:
• The artworks of pop art depended on the culture of society, the environment, consumer materials, advertisements, existential concepts and artistic methods represented by Dada, which represented the gathering of the different in which the artist relied on the imagination to achieve a thrill that achieves astonishment for the recipient.
• Imagination as a system of thought depends on form and reality on references whose origin is from finished goods, materials, and furniture, which is one of the most important characteristics of Pop Art.
And lastly were the conclusions and the list of sources
This piece of research deals with assimilation as one of the phonological processes in the language. It is a trial to give more attention to this important process in English language with deep explanation to its counterpart in Arabic. in addition, this study sheds light on the points of similarities and differences concerning this process in the two languages. Assimilation in English means two sounds are involved, and one becomes more like the other.
The assimilating phoneme picks up one or more of the features of another nearby phoneme. The English phoneme /n/ has t
... Show MoreThe research aims to determine the strength of the relationship between time management and work pressure and administrative leadership, where he was taken a sample of (47) of the administrative leadership at the Higher Institute of security and administrative development in the Ministry of Interior was used questionnaire as a key tool in collecting data and information and analyzed the answers to the sample surveyed by using Statistical program (spss) in the arithmetic mean of the calculation and test (t) and the correlation coefficient, the research found the most important results: the existence of significant moral positive relationship between both time management and work pressure and administrative leadership, the leadership of th
... Show MoreBackground: The high reactivity of hydrogen peroxide used in bleaching agents have raised important questions on their potential adverse effects on physical properties of restorative materials. The purpose of this in vitro study was to evaluate the effect of in-office bleaching agents on the microhardness of a new Silorane-based restorative material in comparison to methacrylate-based restorative material. Materials and method: Forty specimens of Filtek™ P90 (3M ESPE,USA) and Filtek™ Supreme XT (3M ESPE, USA) of (8mm diameter and 3m height) were prepared. All specimens were polished with Sof-Lex disks (3M ESPE, USA). All samples were rinsed and stored in incubator 37˚C for 24 hours in DDW. Ten sample of each material were subjected to
... Show Moreract
This reaserch seeks To answer Wondering :(Is there a possibility employ strategic agility In companies sample Serving in Iraq ?)
This reaserch aims: explore Strategic Agility rely upon Dimensions that interact with each other to form the intcllectual frame Strategic Agility, These dimensions are: (Clarity of vision, Selected
... Show Moreسوسيولوجية "ثوارت" "الربيع العربي (دراسة تحليلية لفعل الثورات العربية)
يرمي الكتاب الى التعرّف على خصائص البحوث المنشورة في مجلة الأستاذ وبيان السمات والمكونات الأساسية للمجلة واعداد كشافات تراكمية متنوعة لها . وجاء الكتاب في خمسة مباحث تناول المبحث الاول الاطار العام للبحث ،وضمَّ مشكلة البحث وأهميته وأهدافه واجراءاته والدراسات السابقة ،وتناول المبحث الثاني الدراسة النظرية وضم التعريف بـكشافات الدوريات ،وبيان أهميتها والتعريف بـ كلية التربية /ابن رشد وبيان أهدافها ،ومن ثم ا
... Show Moreعلى الرغم من تحقق ثورة هائلة وطفرة نوعية في مجال تكنلوجيا الاتصالات في دول العالم الا ان بلدنا كان محروما من التمتع بهذه التقنيات الحديثة في ظل النظام السابق, وبعد سقوط النظام ووجود بحبوحة من الحرية، دخلت الكثير من هذه التقنيات الى العراق ومنها الموبايل والانترنيت وغيرها من وسائل الاتصال المتطورة.
ويقول (Smith & Fletcher, 2001) في كتابهما Inside Information
... Show MoreZubair Formation is one of the richest petroleum systems in Southern Iraq. This formation is composed mainly of sandstones interbedded with shale sequences, with minor streaks of limestone and siltstone. Borehole collapse is one of the most critical challenges that continuously appear in drilling and production operations. Problems associated with borehole collapse, such as tight hole while tripping, stuck pipe and logging tools, hole enlargement, poor log quality, and poor primary cement jobs, are the cause of the majority of the nonproductive time (NPT) in the Zubair reservoir developments. Several studies released models predicting the onset of borehole collapse and the amount of enlargement of the wellbore cross-section. However, assump
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More