Fine art represents part of society's culture. The development of art was accompanied by the penetration of new worlds known as the fourth dimension. After art entered the boundaries of geometry and reduction; He began to break into the absurd, and the form and philosophy of art changed, moving from modernity to what came after it to contemporary. Transforming from a formal form into a symbolic form with philosophical implications linked to the light, audio and kinetic effects as they embody time, the concept became the master of the idea. The research aims to identify the concept of time and its types, then the philosophical concept of time and its reflection on contemporary art, through the analytical study of a selection of contemporary arts based on investigating the philosophy of time.
Today many people suffering from health problems like dysfunction in lungs and cardiac. These problems often require surveillance and follow up to save a patient's health, besides control diseases before progression. For that, this work has been proposed to design and developed a remote patient surveillance system, which deals with 4 medical signs (temperature, SPO2, heart rate, and Electrocardiogram ECG. An adaptive filter has been used to remove any noise from the signal, also, a simple and fast search algorithm has been designed to find the features of ECG signal such as Q,R,S, and T waves. The system performs analysis for medical signs that are used to detected abnormal values. Besides, it sends data to the Base-Stati
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreInternet of Things (IoT) technology could be an effective solution to accomplish real-time retrieval of historical electronic health records (EHRs) to present better service of healthcare. In a pilgrimage environment such as the Hajj, IoT can be applied by identifying the non-local patients as electronic tags, and the tag data can be read by wireless sensors. The data that is collected using Radio-Frequency Identification (RFID) can be acquired from a Wireless Sensor Network (WSN) in order to accomplish many decisions, such as sending an ambulance to a patient’s location, sending an emergency alert to his immediate family circle, and retrieving his EHR from a database. The main contribution of this research is to propose a conceptual IoT
... Show MoreThis paper deals with finding an approximate solution to the index-2 time-varying linear differential algebraic control system based on the theory of variational formulation. The solution of index-2 time-varying differential algebraic equations (DAEs) is the critical point of the equivalent variational formulation. In addition, the variational problem is transformed from the indirect into direct method by using a generalized Ritz bases approach. The approximate solution is found by solving an explicit linear algebraic equation, which makes the proposed technique reliable and efficient for many physical problems. From the numerical results, it can be implied that very good efficiency, accuracy, and simplicity of the pre
... Show MoreTrue random number generators are essential components for communications to be conconfidentially secured. In this paper a new method is proposed to generate random sequences of numbers based on the difference of the arrival times of photons detected in a coincidence window between two single-photon counting modules
Faces blurring is one of the important complex processes that is considered one of the advanced computer vision fields. The face blurring processes generally have two main steps to be done. The first step has detected the faces that appear in the frames while the second step is tracking the detected faces which based on the information extracted during the detection step. In the proposed method, an image is captured by the camera in real time, then the Viola Jones algorithm used for the purpose of detecting multiple faces in the captured image and for the purpose of reducing the time consumed to handle the entire captured image, the image background is removed and only the motion areas are processe
... Show MoreThin films of pure polycarbonate (PC) with anthracene doping PC films for different doping ratios (10, 20, 30, 40, 50 and 60 ml) were prepared by using a casting method. The influence of anthracene doping ratio on photo-fries rearrangement of polycarbonate was systematic investigated. Furthermore, pure PC and anthracene doping PC films were irradiated via UV light at a wavelength (254 nm) for different periods (5, 240, 288, and 360 hrs). The photo-fries rearrangement occurring in pure PC and anthracene doping PC films were monitored using UV and FTIR spectroscopies. The photo-fries rearrangement leads to scission the carbonate linkage and formation phenylsalicylate and dihydroxybenzophenes. The result of the UV spectrum confirms disappea
... Show MoreThis paper deals with numerical approximations of a one-dimensional semilinear parabolic equation with a gradient term. Firstly, we derive the semidiscrete problem of the considered problem and discuss its convergence and blow-up properties. Secondly, we propose both Euler explicit and implicit finite differences methods with a non-fixed time-stepping procedure to estimate the numerical blow-up time of the considered problem. Finally, two numerical experiments are given to illustrate the efficiency, accuracy, and numerical order of convergence of the proposed schemes.