This paper deals with one of important topics that serve the art movement music, which is looking at the stairs of Arab music in the process of reaching to the directory musical on the subject of so-called (Photo by stairs music) and that by comparing the method used previously and the proposed rules reached by the researcher and received the patent invention, the method is easier for the musician and the author in a directory of peace Arab music when used on grades and half grades voice, and to achieve its objectives researcher dealt with the problem that is determined by the multitude of stairs leading Arab and the difficulty of keeping its catalog of music, and for being an anchor and pillar of the music was taken up and put her importance and objectives. The theoretical framework Vahtoy on the following topics: (the date of the Arab musical scale - Specifications for the Arab peace signs and conversion in the basic stairs), as research has included some of the signs of transformation in Sub-stairs. The terms of the previous studies did not find a researcher studies similar to this study. The research methodology and procedures have relied on the comparison between the rules used in the past and proposed rules applicable to a number of scores music and fairness in peace and to identify similarities among them and that will help us in the curriculum theories of music, in addition to the fact that this comparison shows the importance of these rules and use them practically and theoretically in Arabic Music , the researcher has quit, achieving the results of its objectives, and develop some recommendations and followed by a list of sources.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreA modification to cascaded single-stage distributed amplifier (CSSDA) design by using active inductor is proposed. This modification is shown to render the amplifier suitable for high gain operation in small on-chip area. Microwave office program simulation of the Novel design approach shows that it has performance compatible with the conventional distributed amplifiers but with smaller area. The CSSDA is suitable for optical and satellite communication systems.
In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreAbsence or hypoplasia of the internal carotid artery (ICA) is a rare congenital anomaly that is mostly unilateral and highly associated with other intracranial vascular anomalies, of which saccular aneurysm is the most common. Blood flow to the circulation of the affected side is maintained by collateral pathways, some of which include the anterior communicating artery (Acom) as part of their anatomy. Therefore, temporary clipping during microsurgery on Acom aneurysms in patients with unilateral ICA anomalies could jeopardize these collaterals and place the patient at risk of ischemic damage. In this paper, we review the literature on cases with a unilaterally absent ICA associa
DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreLying is considered a dangerous tendency among children if it has become a habit. It results in many social problems, such as child’s loss of confidence, lack of others’ respect to him, and his lack of respect to the desired values of the society, such as honesty and trust. Consequently, he will be led to a deviation when he becomes old; especially if the child’s socially unaccepted behavior has not been directed. The research, thus, aims to examine the causes of lying in the most important stage of children’s life; that is, between (4-6) years. Such an aim helps to know about the individual reasons of lying among males and females from teachers’ perspectives. To meet the objective of the study, a number of (128) children
... Show MoreThe purpose of this study is to investigate the histopathological response of dentinopulpal
response of human teeth to the Er: YAG laser cavity preparation in comparison with the conventional
class I cavity preparation. Thirty five sound human upper and lower first premolar teeth which were
needed to be extracted for orthodontic purposes were used in the study. Regarding to the method of
cavity preparation, the teeth were grouped into three groups; Group1; Control group which consists of
seven sound teeth without cavity preparation, Group2; Conventional cavity preparation group and group
3; Er: YAG laser cavity preparation group. Each of Group2 and3 consists of fourteen teeth that is
subdivided into: A. 7teeth that e
The current study deals with estimating the protein concentration and the effect of fish weight on protein concentration values in red and white muscles in two different regions ( R1 : Anterior region lies 2 cm behind the head and R2: posterior region lies 2cm from caudal fin (in two types of bony fish, namely common carp (Cyprinus carpio) and Nile tilapia (Oreochromis niloticus). Samples were collected from Karmat Ali river- north of Basrah between October 2019 and February 2020. The protein was extracted using protein extraction buffer, the current study show that the average of protein concentration in red muscles of Nile tilapia ranged between 7.74-7.4 mg / ml and ( 6.8-8.85 mg / ml) in R1 and R2 region re
... Show MoreThe name of God the Merciful
Praise be to Allah, Lord of the Worlds, and prayers and peace be upon the prophets and messengers Prophet Muhammad and his family
And his companions who followed his approach to the Day of Judgment. After that, Islam has paid great attention to the aspects of education
The promise of a way to degrade and correct behavior, and to reach the individual to the highest levels through his intellectual upbringing
Mentally, mentally, mentally and intellectually, education at all times and places is the best way to communicate to a human being
The degree of happiness in religion and the other, as it develops all aspects of his personality, and supports the love of goodness for himself
For people, edu
Objective: To identified the relationship between general and spinal Anesthesia upon breastfeeding and (demographic &reproductive) : Comparative Study. Methodology: The present study employs a descriptive comparative design held at the labor and delivery room , operational room for cesarean section and maternity word in maternity department at Al Emamain Al Kadhamain Medical City in Baghdad city. Data collection was initiated on 2nd January to end of March /2014. Purposive sample consisted of (150) mother and her neonate, The study sample divided into three groups:(50) under general anesthesia , (50) under