Preferred Language
Articles
/
jcofarts-1064
color methodology to Re-reading the musical notes
...Show More Authors

many painters tried to mix colors with Music by direct employment through colorful musical pieces or the use of multiple instruments and techniques , or vice versa, including the French artist )Robert Stroben(, he transferred the piece of music to be depicted on the painting and worked on the tones of music (Johann Sebastian Bach) by dropping the color on the lines of the musical scale, for example (the C tone) ranging from brown to red ( Tone La A) from gray to orange, and so on, the presence of links and similarity factors between the world of music and the world of colors facilitated the process of linking musical notes with colors, the most famous of which was presented by the world (Newton) in the circle of basic colors and linking them with musical notes (Du tone = violet color) - (Ri tone = indigo color) - (Mi tone = blue color) - (Fa tone = green color) - (Sol tone = yellow color) - (La tone = orange color) - (C tone = red color). But this circuit is not enough in converting the musical note to a specific color. It is one of the basics of musicology. The notes are repeated in every (octave) but by increasing the speed of their frequencies. The melodies are based on the major scales, which seem bright, cheerful and optimistic, while the minor scales (miner) seem bleak. Serious and sad. This is what the German scientist (Goethe) sees as there is a similarity between the two worlds of colors and music. In the “melody field” we find the two musical scales (small and large) or what is known as (major and minor), and he sees the contrast between them in the “color field” in degrees of lightness and darkness. On the other hand, we find that colors differ in their energies according to color, as the scientist (Munsel) introduced the color measurement system through (the color is H, the amount of its saturation S and the amount of luminance v), and when creating a (Munsell) of colors, we find that it is not symmetrical, so pure, saturated red extends farther From the central axis about greenish-blue, as well as for the value (V), the blue-purple colors reach their full saturation when the value (V) is very low, and some colors such as yellow retain a high value (V) and high saturation. Therefore, the result of a (genus) is a three-dimensional quasi-spherical solid. According to the above, a color model representing the musical notes was formulated according to their position from the octave and according to their presence in a high or low scale, and the frequency of the sound wave was calculated, corresponding to the amount of the corresponding light wave frequency divided by (terra) /(107) multiplied by x(1.05) And it was applied in the samples of this research.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Iraqi Journal Of Science
On Semiannahilator Supplement Submodules
...Show More Authors

Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes

Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Study of structural, optical and electrical properties of thin Ag2Cu2O4 films prepared by pulsed laser deposition
...Show More Authors

The influence of sintering and annealing temperatures on the structural, surface morphology, and optical properties of Ag2Cu2O4 thin films which deposited on glass substrates by pulsed laser deposition method have been studied. Ag2Cu2O4 powders have polycrystalline structure, and the Ag2Cu2O4 phase was appear as low intensity peak at 35.57o which correspond the reflection from (110) plane. Scan electron microscopy images of Ag2Cu2O4 powder has been showed agglomerate of oxide particles with platelets shape. The structure of thin films has been improved with annealing temperature. Atomic Force micrographs of Ag2Cu2O4 films showed uniform, homogenous films and the shape of grains was almost spherical and larger grain size of 97.85 nm has o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Indian Journal Of Natural Sciences
Surface Photometry and Morphology Properties of Spiral Galaxies: NGC4725, NGC4639 as Case Study
...Show More Authors

In this study, two active galaxies (NGC4725, NGC4639) have been chosen to study their morphological and photometric properties, by using the IRAF ISOPHOTE ELLIPS task with griz-filters. Observations are obtained from the Sloan Digital Sky Survey (SDSS) which reaches now to the DATA Release (DR14). The data reduction of all images (bias and flat field) has been done by SDSS Pipeline. The surface photometric investigation was performed like the magnitude. Together with isophotal contour maps, surface brightness profiles and a bulge/disk decomposition of the images of the galaxies, although the disk position angle, ellipticity, and inclination of the galaxies have been done. Also, the color of galaxies was studied, where chromatic distribution

... Show More
View Publication
Publication Date
Thu May 04 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Generalized Regular Continuous Functions In Topological Spaces
...Show More Authors

In this paper we introduce a new type of functions called the generalized regular
continuous functions .These functions are weaker than regular continuous functions and
stronger than regular generalized continuous functions. Also, we study some
characterizations and basic properties of generalized regular continuous functions .Moreover
we study another types of generalized regular continuous functions and study the relation
among them

View Publication Preview PDF
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
Mechanical Properties Enhancement of Conventional Glass Ionomer Cement by Adding Zirconium Oxide Micro and Nanoparticles
...Show More Authors

The aim of this work is to enhance the mechanical properties of the glass ionomer cement GIC (dental materials) by adding Zirconium Oxide ZrO2 in both micro and nano particles. GIC were mixed with (3, 5 and 7) wt% of both ZrO2 micro and nanoparticles separately. Compressive strength (CS), biaxial flexural strength (BFS), Vickers Microhardness (VH) and wear rate losses (WR) were investigated. The maximum compression strength was 122.31 MPa with 5 wt. % ZrO2 micro particle, while 3wt% nanoparticles give highest Microhardness and biaxial flexural strength of 88.8 VHN and 35.79 MPa respectively. The minimum wear rate losses were 3.776µg/m with 7 wt. % ZrO2 nanoparticle. GIC-contai

... Show More
View Publication Preview PDF
Crossref (11)
Crossref
Publication Date
Thu Dec 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Experimental Study and Numerical Simulation of Sheet Hydroforming Process for Aluminum Alloy AA5652
...Show More Authors

 Abstract   

Lightweight materials is used in the sheet metal hydroforming process,  because it can be adapted to the manufacturing of complex structural components into a single body with high structural stiffness. Sheet hydroforming has been successfully developed in industry such as in the manufacturing of the components of automotive.The aim of this study is to simulate the experimental results ( such as the amount of pressure required to hydroforming process, stresses, and strains distribution)  with results  of finite element analyses (FEA)  (ANSYS 11)  for aluminum alloy (AA5652) sheets with  thickness (1.2mm) before heat treatm

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
X.K.N: A Proposed Method for Data Encryption Using XOR and NOT Logical Gates with LFSR Generated Keys
...Show More Authors

In this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.

View Publication Preview PDF
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
Understanding Inclusion (National and International Perspective)
...Show More Authors

Abstract

There have been a number of positive developments in inclusive education in many different countries, recognizing that all students, including those with disabilities, have a right to education. Around the world, educators, professionals, and parents are concerned about including children with disabilities in mainstream schools along with their peers. As a result of this trend, a number of factors are contributing, including the increasing importance of education in achieving social justice for pupils with special education needs; the right of individuals with disabilities to attend mainstream schools together with their typically developing peers; the benefit of equal opportunities for everyone in achie

... Show More
View Publication Preview PDF
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Application of Wavelet Packet and S Transforms for Differential Protection of Power Transformer
...Show More Authors

The differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref