many painters tried to mix colors with Music by direct employment through colorful musical pieces or the use of multiple instruments and techniques , or vice versa, including the French artist )Robert Stroben(, he transferred the piece of music to be depicted on the painting and worked on the tones of music (Johann Sebastian Bach) by dropping the color on the lines of the musical scale, for example (the C tone) ranging from brown to red ( Tone La A) from gray to orange, and so on, the presence of links and similarity factors between the world of music and the world of colors facilitated the process of linking musical notes with colors, the most famous of which was presented by the world (Newton) in the circle of basic colors and linking them with musical notes (Du tone = violet color) - (Ri tone = indigo color) - (Mi tone = blue color) - (Fa tone = green color) - (Sol tone = yellow color) - (La tone = orange color) - (C tone = red color). But this circuit is not enough in converting the musical note to a specific color. It is one of the basics of musicology. The notes are repeated in every (octave) but by increasing the speed of their frequencies. The melodies are based on the major scales, which seem bright, cheerful and optimistic, while the minor scales (miner) seem bleak. Serious and sad. This is what the German scientist (Goethe) sees as there is a similarity between the two worlds of colors and music. In the “melody field” we find the two musical scales (small and large) or what is known as (major and minor), and he sees the contrast between them in the “color field” in degrees of lightness and darkness. On the other hand, we find that colors differ in their energies according to color, as the scientist (Munsel) introduced the color measurement system through (the color is H, the amount of its saturation S and the amount of luminance v), and when creating a (Munsell) of colors, we find that it is not symmetrical, so pure, saturated red extends farther From the central axis about greenish-blue, as well as for the value (V), the blue-purple colors reach their full saturation when the value (V) is very low, and some colors such as yellow retain a high value (V) and high saturation. Therefore, the result of a (genus) is a three-dimensional quasi-spherical solid. According to the above, a color model representing the musical notes was formulated according to their position from the octave and according to their presence in a high or low scale, and the frequency of the sound wave was calculated, corresponding to the amount of the corresponding light wave frequency divided by (terra) /(107) multiplied by x(1.05) And it was applied in the samples of this research.
Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes
The influence of sintering and annealing temperatures on the structural, surface morphology, and optical properties of Ag2Cu2O4 thin films which deposited on glass substrates by pulsed laser deposition method have been studied. Ag2Cu2O4 powders have polycrystalline structure, and the Ag2Cu2O4 phase was appear as low intensity peak at 35.57o which correspond the reflection from (110) plane. Scan electron microscopy images of Ag2Cu2O4 powder has been showed agglomerate of oxide particles with platelets shape. The structure of thin films has been improved with annealing temperature. Atomic Force micrographs of Ag2Cu2O4 films showed uniform, homogenous films and the shape of grains was almost spherical and larger grain size of 97.85 nm has o
... Show MoreIn this study, two active galaxies (NGC4725, NGC4639) have been chosen to study their morphological and photometric properties, by using the IRAF ISOPHOTE ELLIPS task with griz-filters. Observations are obtained from the Sloan Digital Sky Survey (SDSS) which reaches now to the DATA Release (DR14). The data reduction of all images (bias and flat field) has been done by SDSS Pipeline. The surface photometric investigation was performed like the magnitude. Together with isophotal contour maps, surface brightness profiles and a bulge/disk decomposition of the images of the galaxies, although the disk position angle, ellipticity, and inclination of the galaxies have been done. Also, the color of galaxies was studied, where chromatic distribution
... Show MoreIn this paper we introduce a new type of functions called the generalized regular
continuous functions .These functions are weaker than regular continuous functions and
stronger than regular generalized continuous functions. Also, we study some
characterizations and basic properties of generalized regular continuous functions .Moreover
we study another types of generalized regular continuous functions and study the relation
among them
The aim of this work is to enhance the mechanical properties of the glass ionomer cement GIC (dental materials) by adding Zirconium Oxide ZrO2 in both micro and nano particles. GIC were mixed with (3, 5 and 7) wt% of both ZrO2 micro and nanoparticles separately. Compressive strength (CS), biaxial flexural strength (BFS), Vickers Microhardness (VH) and wear rate losses (WR) were investigated. The maximum compression strength was 122.31 MPa with 5 wt. % ZrO2 micro particle, while 3wt% nanoparticles give highest Microhardness and biaxial flexural strength of 88.8 VHN and 35.79 MPa respectively. The minimum wear rate losses were 3.776µg/m with 7 wt. % ZrO2 nanoparticle. GIC-contai
... Show MoreAbstract
Lightweight materials is used in the sheet metal hydroforming process, because it can be adapted to the manufacturing of complex structural components into a single body with high structural stiffness. Sheet hydroforming has been successfully developed in industry such as in the manufacturing of the components of automotive.The aim of this study is to simulate the experimental results ( such as the amount of pressure required to hydroforming process, stresses, and strains distribution) with results of finite element analyses (FEA) (ANSYS 11) for aluminum alloy (AA5652) sheets with thickness (1.2mm) before heat treatm
... Show MoreIn this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.
Abstract
There have been a number of positive developments in inclusive education in many different countries, recognizing that all students, including those with disabilities, have a right to education. Around the world, educators, professionals, and parents are concerned about including children with disabilities in mainstream schools along with their peers. As a result of this trend, a number of factors are contributing, including the increasing importance of education in achieving social justice for pupils with special education needs; the right of individuals with disabilities to attend mainstream schools together with their typically developing peers; the benefit of equal opportunities for everyone in achie
... Show MoreThe differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the