many painters tried to mix colors with Music by direct employment through colorful musical pieces or the use of multiple instruments and techniques , or vice versa, including the French artist )Robert Stroben(, he transferred the piece of music to be depicted on the painting and worked on the tones of music (Johann Sebastian Bach) by dropping the color on the lines of the musical scale, for example (the C tone) ranging from brown to red ( Tone La A) from gray to orange, and so on, the presence of links and similarity factors between the world of music and the world of colors facilitated the process of linking musical notes with colors, the most famous of which was presented by the world (Newton) in the circle of basic colors and linking them with musical notes (Du tone = violet color) - (Ri tone = indigo color) - (Mi tone = blue color) - (Fa tone = green color) - (Sol tone = yellow color) - (La tone = orange color) - (C tone = red color). But this circuit is not enough in converting the musical note to a specific color. It is one of the basics of musicology. The notes are repeated in every (octave) but by increasing the speed of their frequencies. The melodies are based on the major scales, which seem bright, cheerful and optimistic, while the minor scales (miner) seem bleak. Serious and sad. This is what the German scientist (Goethe) sees as there is a similarity between the two worlds of colors and music. In the “melody field” we find the two musical scales (small and large) or what is known as (major and minor), and he sees the contrast between them in the “color field” in degrees of lightness and darkness. On the other hand, we find that colors differ in their energies according to color, as the scientist (Munsel) introduced the color measurement system through (the color is H, the amount of its saturation S and the amount of luminance v), and when creating a (Munsell) of colors, we find that it is not symmetrical, so pure, saturated red extends farther From the central axis about greenish-blue, as well as for the value (V), the blue-purple colors reach their full saturation when the value (V) is very low, and some colors such as yellow retain a high value (V) and high saturation. Therefore, the result of a (genus) is a three-dimensional quasi-spherical solid. According to the above, a color model representing the musical notes was formulated according to their position from the octave and according to their presence in a high or low scale, and the frequency of the sound wave was calculated, corresponding to the amount of the corresponding light wave frequency divided by (terra) /(107) multiplied by x(1.05) And it was applied in the samples of this research.
The need for image compression is always renewed because of its importance in reducing the volume of data; which in turn will be stored in less space and transferred more quickly though the communication channels.
In this paper a low cost color image lossy color image compression is introduced. The RGB image data is transformed to YUV color space, then the chromatic bands U & V are down-sampled using dissemination step. The bi-orthogonal wavelet transform is used to decompose each color sub band, separately. Then, the Discrete Cosine Transform (DCT) is used to encode the Low-Low (LL) sub band. The other wavelet sub bands are coded using scalar Quantization. Also, the quad tree coding process was applied on the outcomes of DCT and
Alice Walker's novel The Color Purple1983, whose events take place in the rural Georgia and addresses the most important issues in the early 20thcentury; like male dominant society and women submission to men, weaves a mosaic picture of male-female relationships. Black men like Alphonso, Albert and Harpo are portrayed as oppressors, cruel and they exercise power and violence over their wives and daughters. Through the negative portrayal of black male characters, Walker is accused to be a men hating writer because she ''Views oppression as an essentially masculine activity which springs from the male's aggressive need to dominate. In the novel, man is the premium mobile, the one by whom and t
... Show MoreCompression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh
... Show MoreCompression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet
... Show MoreThe research aims to show the possibility of adopting the market approach to measure the fair value of biological assets in Iraq, by applying to a sample of the company listed on the Iraq Stock Exchange, where the Middle East Fish Production and Marketing Company was selected from among 7 companies representing the agricultural sector in Iraq, and according to the availability of data and for five years, the financial statements were presented of the measurement and disclosure of biological assets at fair value according to the market approach, One of the most important conclusions reached by the researcher is the The possibility of measuring and disclosing biological assets at fair value according to the market approach in the Ira
... Show MoreThe methodology of the concept of sovereignty in contemporary Islamic thought
This research focuses on the difficulties that face Oud's students' in the performance of Sharif Muheyddin Haider musical works. In addition, this research suggests solutions to overcome these difficulties for make it easier to play Haider's musical works. This research also addressed important topics of great relevance the title, problem and the research's aims. Moreover, Procedures of this research adopted the descriptive approach (content analysis) to attain the research's aims. Furthermore, results and discussions where covered, and conclusions of the appropriate academic solutions were achieved to overcome the performance difficulties of Haider's musical works among Oud's students'. At the end, the research presents a set of recomme
... Show MoreThe research aimed to know the effect of the Parashot strategy in developing the reading comprehension skills of first-grade intermediate students in reading. The researchers put the following two null hypotheses: There is no statistically significant difference at the level (0.05) between the average scores of the experimental group students who study the subject Reading with the Parashot strategy in the pre and post-tests in developing reading comprehension skills as a whole. There is no statistically significant difference at the level (0.05) between the average scores of the experimental group students who study the reading material using the Parashot strategy and the average scores of the control group students who study the same subje
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreIdentifying people by their ear has recently received import attention in the literature. The accurate segmentation of the ear region is vital in order to make successful person identification decisions. This paper presents an effective approach for ear region segmentation from color ear images. Firstly, the RGB color model was converted to the HSV color model. Secondly, thresholding was utilized to segment the ear region. Finally, the morphological operations were applied to remove small islands and fill the gaps. The proposed method was tested on a database which consisted of 105 ear images taken from the right sides of 105 subjects. The experimental results of the proposed approach on a variety of ear images revealed that this approac
... Show More