Colors are universal, and throughout the ages, they have been associated with
various religious, social and spiritual meanings. They symbolize a galaxy of things
to designate certain ideas or symbols that are sometimes contradictory.
The present study is an attempt to investigate colors, their meanings and
symbolism, and the approaches to translating color idioms from English into
Arabic. It fathoms one of the thorny areas for translation theorists let alone
practitioners. Various definitions, classifications of types and symbolism across
cultures are provided. After reviewing idioms and methods of translating them, a
survey of 114 sentences that include color idioms was conducted to see which
method is mostly adopted by professionals. The survey has revealed that, among
the methods available for the translator, the most common strategy in translating
color idioms from English into Arabic is paraphrase, followed by loan translation.
In addition, the equivalent effect principle sought by Nida (1964) would not be
achieved and the color element found in the source language is lost in translation,
simply because it has neither linguistic nor cultural correspondent equivalent in the
target language.
Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreAbstract As a part of our ongoing project on the design and synthesis of new 4-thiazolidinone derivatives with antimicrobial activity, four new 4-thiazolidinone derivatives carrying bromo, nitro, methyl, and chloro groups on the benzene ring were synthesized by starting with the 7-amino-4-methylcoumarin moiety, linking coumarin with various phenyl isothiocynate to form the thiourea group, and then cyclizing the derivatives, characterized by IR and 1HNMR, and assayed in vitro for their antimicrobial activity against Gram positive and Gram negative bacteria and fungi. Overall, 2-(4-methyl-2-oxo-2H-chromen-3-yl)-3-(4-nitrophenyl) thiazolidin-4-one to be the most powerful individuals in the series. Based on the observed data, it can be sta
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreWithin this research, The problem of scheduling jobs on a single machine is the subject of study to minimize the multi-criteria and multi-objective functions. The first problem, minimizing the multi-criteria, which include Total Completion Time, Total Late Work, and Maximum Earliness Time (∑𝐶𝑗, ∑𝑉𝑗, 𝐸𝑚𝑎𝑥), and the second problem, minimizing the multi-objective functions ∑𝐶𝑗 + ∑𝑉𝑗 +𝐸𝑚𝑎𝑥 are the problems at hand in this paper. In this study, a mathematical model is created to address the research problems, and some rules provide efficient (optimal) solutions to these problems. It has also been proven that each optimal solution for ∑𝐶𝑗 + ∑𝑉𝑗 + 𝐸𝑚𝑎𝑥 is an effic
... Show MoreThe Bangestan reservoir, which occurs in the Ahwaz oilfield, consists of the middle Cretaceous limestone Ilam and Sarvak Formations that were deposited in the Zagros Basin. The reservoir is divided into ten Zones (A to J) formed in the upper Albian-Santonian and contains considerable hydrocarbon accumulations. The limestones were deposited on an extensive shallow carbonate platform on a passive margin and are dominated by rudist biostrome and grainstone facies. Paleogeographical changes mean that identification of the facies is complex. Seismic stratigraphy and isotopic data are used to better understand the structural and geological setting and develop an understanding of the sedimentary environment. The results show that the rudist biostr
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
Polyimide/polyaniline nanofiber composites were prepared by in situ polymerization with various weight percentages of polyaniline (PANI) nanofibers. X-ray diffraction (XRD) and Fourier transform infrared spectra (FT-IR), proved the successful preparation of PANI nanofiber composite films. In addition, thermal stability of PI/PANI nanofiber composites was superior relative to PI, having 10 % gravimetric loss in the range of 623 °C to 671 °C and glass transition temperature of 289 °C to 297 °C. Furthermore, the values of the loss tangent tanδ and AC conductivity σAC of the nanocomposite films were notably higher than those of pure polyimide. The addition of 5 wt.% to 15 wt.% PANI
In this research the effect of cooling rate and mold type on mechanical properties of the eutectic
and hypoeutectic (Al-Si) alloys has been studied. The alloys used in this research work were (Al- 12.6%Si
alloy) and (Al- 7%Si alloy).The two alloys have been melted and poured in two types of molds with
different cooling rates. One of them was a sand mold and the other was metal mold. Mechanical tests
(hardness, tensile test and impact test) were carried out on the specimens. Also the metallographic
examination was performed.
It has been found that the values of hardness for the alloys(Al-12.6%Si and Al-7%Si) which poured in
metal mold is greater than the values of hardness for the same alloy when it poured in a heated