Advertising technology represents a component of elements of the visual attraction in the urban scape, made its way transmission process of messages between the ends of the source ofinformation (sender) and the Destination information (receiver) of the final recipient of themessage, It serves as a social marked and a means of cultural expression, It is part of the inalienable in creating identity and determine the spatial relationships and also is a reflection ofurban culture to the community. This technology has become an increasing feature of the present era, characterized as the era of the three revolutions: (the information revolution, the technologyrevolution, and the media revolution), Where it became an integral part of the visual
... Show MoreRecently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul
... Show MoreThe occurrences of invasive candidiasis has increased over the previous few decades. Although Candida albicans considers as one of the most common species of organisms, that cause acquired fungal infections. Candida albicans is an opportunistic fungal pathogen and inherent in as a lifelong, the yeast is present in healthy individuals as a commensal, and can reside harmlessly in human body. However, in immuno-compromised individuals, the fungus can invade tissues, producing superficial infections and, in severe cases, life-threatening systemic infections. This review wills emphasis on virulence factor of C. albicans including (adhesion, invasion, candida proteinase, and phenotypic switching and biofilm formation. I
... Show MoreThis text and guide discusses the surgical and medical management of congenital heart diseases in both adult and children. It describes the disease, pathology, treatment, complications and follow-up with extensive use of didactic material to educate the reader to the practicalities of the subject. It details the novel research via an extensive literature review, while covering all aspects of the surgical and medical treatment of congenital heart disease. It includes review of the laparoscopic techniques and epidemiology of each disease involved and their prevalence to provide the reader with the full clinical picture. Clinical and Surgical Aspects of Congenital Heart Diseases: Text and Study Guide provides a thorough practical reference fo
... Show MoreIn this paper, a solar concentrator is designed in the form of a concave half-cylindrical mirror consisting of polygonal reflective surface plates. The plates are arranged to give a hemispherical shape to the design. These surfaces work to receive solar radiation and focusing by reflecting it to the receiver that is placed in front of the reflecting surfaces. The results are compared with a system consisting of a concave reflecting surface of the same dimensions to obtain a good criterion for evaluating the design performance. The results showed a low acceptance angle for the design for all the samples used due to the geometrical design nature. The optical efficiency affected by the angle of incidence greatly by
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreWar was and remains one of the main instruments for the practice of international relations, and has always been a major focus of the study of international relations. War, such as diplomacy, propaganda, etc., is an instrument of national politics. States have used wars to achieve their goals and aspirations and achieve their national interests. War and peace issues are essential to understanding international relations. They are questions that involve the problem of survival.
Today the term "war" is used in many different ways. We talk about Cold War, Hot War, Limited War, Total War, Conventional War, Unconventional War, Civil War, Gang War, Preventive War etc. However, the war continued to exist, and took various forms.
... Show More