The research is to identify the legend of the seven eyes amulet of Babylonian origin and the representations it carried of the link between the Babylonian past and the Islamic present presented in the design works of the promoted products, preserving its impact in the souls as a way to avoid the act of envy, and from this was the research problem that I want to get answers to, which That is (How was the legend of the seven-eyes amulet represented in the design of industrial products?), making its goal to identify how that legend was represented within the design work of marketed industrial products, and in order to reach the answer, the research presented many concepts starting with the legend in its various forms in industrial products. , and to identify the meaning of representation or simulation in design. From it, the researcher was able to reach the analytical axes to get the answer through the three deliberately selected samples, leading to the results. The most important thing in it is that all the samples were clear in expression and focus on the subject of the amulet is apparent in the samples. As for the representation, the means were clearly present, and the topics were represented in a relative manner, while the method of representation was fully realized. The most important conclusions were the Iraqi origin of the legend of the amulet, which was the focus of the focus in the overall construction of the design. As for the representations, the basis was to confirm the authenticity of its Iraqi origin and try to combine the concept of Babylonian envy and what it corresponds to in the subject within Islamic teachings
This study is unique in this field. It represents a mix of three branches of technology: photometry, spectroscopy, and image processing. The work treats the image by treating each pixel in the image based on its color, where the color means a specific wavelength on the RGB line; therefore, any image will have many wavelengths from all its pixels. The results of the study are specific and identify the elements on the nucleus’s surface of a comet, not only the details but also their mapping on the nucleus. The work considered 12 elements in two comets (Temple 1 and 67P/Churyumoy-Gerasimenko). The elements have strong emission lines in the visible range, which were recognized by our MATLAB program in the treatment of the image. The percen
... Show MoreRecent growth in transport and wireless communication technologies has aided the evolution of Intelligent Transportation Systems (ITS). The ITS is based on different types of transportation modes like road, rail, ocean and aviation. Vehicular ad hoc network (VANET) is a technology that considers moving vehicles as nodes in a network to create a wireless communication network. VANET has emerged as a resourceful approach to enhance the road safety. Road safety has become a critical issue in recent years. Emergency incidents such as accidents, heavy traffic and road damages are the main causes of the inefficiency of the traffic flow. These occurrences do not only create the congestion on the road but also increase the fuel consumption and p
... Show MoreIsolated Bacteria from the roots of barley were studied; two stages of processes Isolated and screening were applied in order to find the best bacteria to remove kerosene from soil. The active bacteria are isolated for kerosene degradation process. It has been found that Klebsiella pneumoniae sp. have the highest kerosene degradation which is 88.5%. The optimum conditions of kerosene degradation by Klebsiella pneumonia sp. are pH5, 48hr incubation period, 35°C temperature and 10000ppm the best kerosene concentration. The results 10000ppm showed that the maximum kerosene degradation can reach 99.58% after 48 h of incubation. Higher Kerosene degradation which was 99.83% was obtained at pH5. Kerosene degradation was found to be maximum at 3
... Show MoreIsolated Bacteria from the roots of barley were studied; two stages of processes Isolated and screening were applied in order to nd the best bacteria to remove kerosene from soil. The acve bacteria are isolated for kerosene degradaon process. It has been found that Klebsiella pneumoniae sp. have the highest kerosene degradaon which is 88.5%. The opmum condions of kerosene degradaon by Klebsiella pneumonia sp. are pH5, 48hr incubaon period, 35°C temperature and 10000ppm the best kerosene concentraon. The results 10000ppm showed that the maximum kerosene degradaon can reach 99.58% aer 48 h of incubaon. Higher Kerosene degradaon which was 99.83% was obtained at pH5. Kerosene degradaon was found
... Show MoreCompression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil
... Show MoreThe effect of electrolysis operating parameters on the removal efficiency of cadmium from a simulated wastewater was studied by adopting response surface methodology combined with Box–Behnken Design. As a new electrode design, spiral-wound woven wire mesh rotating cylinder electrode was used for cadmium removal. Current (240–400 mA), rotation speed (200–1000 rpm), initial cadmium concentration (200–600ppm), and cathode mesh number (30–60) were chosen as independent variables while the removal efficiency of cadmium was considered as a response function. The results revealed that the rotation speed has the major effect on the removal efficiency of cadmium. Regression analysis showed good fit of the experimental data to the second-or
... Show MoreIn the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.
Non uniform channelization is a crucial task in cognitive radio receivers for obtaining separate channels from the digitized wideband input signal at different intervals of time. The two main requirements in the channelizer are reconfigurability and low complexity. In this paper, a reconfigurable architecture based on a combination of Improved Coefficient Decimation Method (ICDM) and Coefficient Interpolation Method (CIM) is proposed. The proposed Hybrid Coefficient Decimation-Interpolation Method (HCDIM) based filter bank (FB) is able to realize the same number of channels realized using (ICDM) but with a maximum decimation factor divided by the interpolation factor (L), which leads to less deterioration in stop band at
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show More