This paper presents an investigation to the effect of the forming speed on healing voids that inhabit at various size in an ingot. The study was performed by using finite element method with bilinear isotropic material option, circular type voids were considered. The closure index was able to predict the minimum press force necessary to consolidate voids and the reduction. The simulation was carried out, on circular cross-section lead specials containing a central void of different size. At a time with a flat die, different ratio of inside to outside radius was taken with different speed to find the best result of void closure.
This study aims to reveal the semiotic of “March of Return” cartoon in the Palestinian journalism, topics, Symbols and semantics that were covered.
This study is descriptive. It uses the survey method. Content analysis, and methodological comparison was also used.
The researcher chose an intentional sample of Palestine and Al-Hayat Al-Jadida newspapers for one year from March 30, 2018 to March 31, 2019, through a comprehensive inventory of all cartoons of the return marches during this period, which amounted to 59 cartoons.
The study has reached the following findings:
Newspapers cartoons focused on the topics of durability of the protester
... Show MoreThe research tagged with (similar rulings in the holy heavenly books - the Holy Qur’an and the Bible) highlights that there are a number of rulings in the heavenly books that are similar to each other in terms of content, meaning and significance and did not change from one prophet to another because they relate to the basic interests on which social relations are built. Documenting ties, preserving rights, preventing abuse, etc. These are among the divine purposes in clarifying rulings in order to reach their goals and achieve their goals. Therefore, by combining these rulings, many problems and incidents that are the subject of disagreement and doubt between the two religions can be achieved and addressed. Those who want reform, righ
... Show More
Abstract
The human mind knew the philosophy and logic in the ancient times, and the history afterwards, while the semiotics concept appeared in the modern time, and became a new knowledge field like the other knowledge fields. It deals, in its different concepts and references, with the processes that lead to and reveals the meaning through what is hidden in addition to what is disclosed. It is the result of human activity in its pragmatic and cognitive dimensions together. The semiotic token concept became a knowledge key to access all the study, research, and investigation fields, due to its ability of description, explanation, and dismantling. The paper is divided into two sections preceded by a the
... Show MoreTourist business organizations face a challenging and the risks dynamic environment reflected its impact on the community and generate extra under pressure in the responsibilities and burdens of exceptional and affected much of factors, accidents and risks as a result of the actions and attitudes of disasters variety may exceed the geography of States border, which requires the absorption of risks facing the tourism and how to manage and deal with them scientific and reasonable grounds for the diagnosis and treatment of risk and how to reduce the aggravation and the different kinds.
As risks affecting the most important and vital to organizations as a tourist aspects of the market share and styles tourist
... Show MoreThe aim of the research is to prepare practical volleyball lessons by using the four pillars strategy for middle school students, and to identify the effect of the four pillars strategy in performing the transmission and volleyball skills in the second intermediate students, to assume that the two researchers assume that there are no statistically significant differences between the results of my skill performance tests Sending and preparing tribal and remote volleyball for the experimental and controlled groups, and there are no statistically significant differences between the results of the performance of the transmission and preparation skills of the volleyball between the two experimental and control groups, and the research co
... Show MoreThe study's primary purpose is to explore an appropriate way of monitoring and assessing water depths using the satellite remote sensing technique of the Al Habbaniyah Lake in Iraq. This research studied the experience-conditions (thresholds) of different bands for multi-temporal satellite image data with different satellite image sensors (Landsat 5-TM, and EO1-ALI) for the same region, to recognize regions of water depths. The threshold values are taken that to separate the Al Habbaniyah Lake to the required depths (shallow, deep, and very deep), as a supervised method. A three-dimension feature space plot had used to represent these regions. The relationship of the mean values of the three separated water regions with all TM and A
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called