The current research aims to train students to take benefit of their studies to analyze and taste the artistic works as one of the most important components of the academic structure for students specializing in visual arts; then to activate this during training them the methods of teaching. Consequently, the capabilities of mind maps were employed as a tool that would be through freeing each student to analyze a model of artistic work and think about his analytical principles according to what he knows. Then, a start-up with a new stage revolves around the possibility of transforming this analysis into a teaching style by thinking about how the student would do. The same person who undertook the technical analysis should offer this work and shows what he needs in teaching in terms of goals, means, media, and teaching and learning activities for deciphering the work. Moreover, it aims to simplify it educationally to facilitate its reading and taste by various segments of learners. Accordingly, the current study was applied to (37) fourth stage students studying in the Department of Art Education at Sultan Qaboos University for the academic year 2018/2019. The researcher used the descriptive-analytical and quasi-experimental methods when starting field applications. The results of the research revealed the possibility of employing the technical analysis of works of art in good planning for teaching artistic works and in deepening their analysis methodically and pedagogically when adopting learning positions in art education. The research came out with a number of recommendations, the most important of which is the necessity of training students to delve into the methods of teaching the axes of art history, taste, and art criticism by developing new methods that help students achieve high rates of their art-teaching indicators.
In wireless broadband communications using single-carrier interleave division multiple access (SC-IDMA) systems, efficient multiuser detection (MUD) classes that make use of joint hybrid decision feedback equalization (HDFE)/ frequency decision-feedback equalization (FDFE) and interference cancellation (IC) techniques, are proposed in conjunction with channel coding to deal with several users accessing the multipath fading channels. In FDFE-IDMA, the feedforward (FF) and feedback (FB) filtering operations of FDFE, which use to remove intersymbol interference (ISI), are implemented by Fast Fourier Transforms (FFTs), while in HDFE-IDMA the only FF filter is implemented by FFTs. Further, the parameters involved in the FDFE/
... Show MoreThe integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period. &nb
... Show MoreThis research investigates new glasses which are best suitable for design of optical systems
working in the infrared region between 1.01 to 2.3μm. This work is extended to Oliva & Gennari
(1995,1998) research in which they found that the best known achromatic pairs are (BAF2-IRG2; SRF2-
IRG3; BAF2-IRG7; CAF2-IRGN6; BAF2-SF56A and BAF2-SF6). Schott will most probably stop the
production of these very little used and commercially uninteresting IRG glasses. In this work equally
good performances can be obtained by coupling BAF2, SRF2&CAF2 with standard glasses from Schott
or Ohara Company. The best new achromatic pairs found are (SRF2-S-TIH10; CAF2-S-LAL9; CAF2-SLAL13
and CAF2-S-BAH27). These new achromatic pai
Longer follow-up defense , one of basketball skills that require the team collective action involving active part and consistent to acquire bouncing balls even not be a chance for members of the team striker acquisition rebounding from the target area and bring it back again , which reduces the chances of scoring, and it enables team members defender of the performance of fast attack and score points for being the increase your chances of success.In light of the foregoing, reflected the importance of research in achieving the objective basis of skill tests that require a circumstance similar to the circumstances of the game with the standard operating procedures for the registration, and that the validity judged by consistency between tests
... Show MoreGraph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
High cost of qualifying library standard cells on silicon wafer limits the number of test circuits on the test chip. This paper proposes a technique to share common load circuits among test circuits to reduce the silicon area. By enabling the load sharing, number of transistors for the common load can be reduced significantly. Results show up to 80% reduction in silicon area due to load area reduction.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Capillary pressure is a significant parameter in characterizing and modeling petroleum reservoirs. However, costly laboratory measurements may not be sufficiently available in some cases. The problem amplifies for carbonate reservoirs because relatively enormous capillary pressure curves are required for reservoir study due to heterogeneity. In this work, the laboratory measurements of capillary pressure and formation resistivity index were correlated as both parameters are functions of saturation. Forty-one core samples from an Iraqi carbonate reservoir were used to develop the correlation according to the hydraulic flow units concept. Flow zone indicator (FZI) and Pore Geometry and Structure (PGS) approaches were used to identify
... Show MoreThe aim of this research is to design and construct a
semiconductor laser range finder operating in the near infrared range
for ranging and designation. The main part of the range finder is the
transmitter which is a semiconductor laser type GaAs of wavelength
0.904 μm with a beam expander and the receiver; a silicon pin
detector biased to approve the fast response time with it's collecting
optics. The transmitters pulse width was 200ns at a threshold current
of 10 Ampere and maximum operating current of 38 Ampere. The
repetition rate was set at 660Hz and the maximum operating output
power was around 1 watt. The divergence of the beam was 0.268o
the efficiency of the laser was 0.03% at a duty cycle of 1.32x
In this article, a new efficient approach is presented to solve a type of partial differential equations, such (2+1)-dimensional differential equations non-linear, and nonhomogeneous. The procedure of the new approach is suggested to solve important types of differential equations and get accurate analytic solutions i.e., exact solutions. The effectiveness of the suggested approach based on its properties compared with other approaches has been used to solve this type of differential equations such as the Adomain decomposition method, homotopy perturbation method, homotopy analysis method, and variation iteration method. The advantage of the present method has been illustrated by some examples.