many painters tried to mix colors with Music by direct employment through colorful musical pieces or the use of multiple instruments and techniques , or vice versa, including the French artist )Robert Stroben(, he transferred the piece of music to be depicted on the painting and worked on the tones of music (Johann Sebastian Bach) by dropping the color on the lines of the musical scale, for example (the C tone) ranging from brown to red ( Tone La A) from gray to orange, and so on, the presence of links and similarity factors between the world of music and the world of colors facilitated the process of linking musical notes with colors, the most famous of which was presented by the world (Newton) in the circle of basic colors and linking them with musical notes (Du tone = violet color) - (Ri tone = indigo color) - (Mi tone = blue color) - (Fa tone = green color) - (Sol tone = yellow color) - (La tone = orange color) - (C tone = red color). But this circuit is not enough in converting the musical note to a specific color. It is one of the basics of musicology. The notes are repeated in every (octave) but by increasing the speed of their frequencies. The melodies are based on the major scales, which seem bright, cheerful and optimistic, while the minor scales (miner) seem bleak. Serious and sad. This is what the German scientist (Goethe) sees as there is a similarity between the two worlds of colors and music. In the “melody field” we find the two musical scales (small and large) or what is known as (major and minor), and he sees the contrast between them in the “color field” in degrees of lightness and darkness. On the other hand, we find that colors differ in their energies according to color, as the scientist (Munsel) introduced the color measurement system through (the color is H, the amount of its saturation S and the amount of luminance v), and when creating a (Munsell) of colors, we find that it is not symmetrical, so pure, saturated red extends farther From the central axis about greenish-blue, as well as for the value (V), the blue-purple colors reach their full saturation when the value (V) is very low, and some colors such as yellow retain a high value (V) and high saturation. Therefore, the result of a (genus) is a three-dimensional quasi-spherical solid. According to the above, a color model representing the musical notes was formulated according to their position from the octave and according to their presence in a high or low scale, and the frequency of the sound wave was calculated, corresponding to the amount of the corresponding light wave frequency divided by (terra) /(107) multiplied by x(1.05) And it was applied in the samples of this research.
Calcium-Montmorillonite (bentonite) [Ca-MMT] has been prepared via cation exchange reaction using benzalkonium chloride [quaternary ammonium] as a surfactant to produce organoclay which is used to prepare polymer composites. Functionalization of this filler surface is very important factor for achieving good interaction between filler and polymer matrix. Basal spacing and functional groups identification of this organoclay were characterized using X-Ray Diffraction (XRD) and Fourier Transform Infrared (FTIR) spectroscopy respectively. The (XRD) results showed that the basal spacing of the treated clay (organoclay) with the benzalkonium chloride increased to 15.17213 0A, this represents an increment of about 77.9% in the
... Show MoreIn this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise near topological spaces over B. Also, we introduce the concepts of fibrewise near closed and near open topological spaces over B; Furthermore we state and prove several Propositions concerning with these concepts.

The bandwidth requirements of telecommunication network users increased rapidly during the last decades. Optical access technologies must provide the bandwidth demand for each user. The passive optical access networks (PONs) support a maximum data rate of 100 Gbps by using the Orthogonal Frequency Division Multiplexing (OFDM) technique in the optical access network. In this paper, the optical broadband access networks with many techniques from Time Division Multiplexing Passive Optical Networks (TDM PON) to Orthogonal Frequency Division Multiplex Passive Optical Networks (OFDM PON) are presented. The architectures, advantages, disadvantages, and main parameters of these optical access networks are discussed and reported which have many ad
... Show MoreAverage per capita GDP income is an important economic indicator. Economists use this term to determine the amount of progress or decline in the country's economy. It is also used to determine the order of countries and compare them with each other. Average per capita GDP income was first studied using the Time Series (Box Jenkins method), and the second is linear and non-linear regression; these methods are the most important and most commonly used statistical methods for forecasting because they are flexible and accurate in practice. The comparison is made to determine the best method between the two methods mentioned above using specific statistical criteria. The research found that the best approach is to build a model for predi
... Show MoreThe n-type Au thin films of 500nm thickness was evaporated by thermal evaporation method on p-type silicon wafer of [111] direction to formed Au/Si heterojunction solar cell. The AC conductivity, C-V and I-V characteristics of fabricated c-Au/Si diffusion heterojunction-(HJ) solar cell, has been studied. The first methods demonstrated that the AC conductivity due to with diffusiontunneling mechanism, while the second show that, the heterojunction profile is abrupt, the heterojunction parameters have been played out, such as the depletion width, built-in voltage, and concentration. And finally the third one show that the c-Au/Si HJ has rectification properties, and the solar cell yielded an open circuit voltage of (Vic) 0.4V, short circuit c
... Show MoreIn this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained
Due to the impact of industrial companies on the ransformations and developments witnessed by the world in general nd Iraq in particular, especially in the industrial and economic Jonrnal spects, the liberalization of internal and external trade, and the idoption of the open market policy in Iraq, which led to the intensification of competition between industrial companies and heir products and services, and the increase and diversity of the Onumber of alternatives Available to the public on the one hand, and he diversity and change of their desires and needs on the other hand, which was reflected in the reality of those companies and heir products or services, especially in light of the great challenges facing companies and the deteriorat
... Show MoreReactive Powder Concrete (RPC) can be incorporate as a one of the most important and progressive concrete technology. It is a special type of ultra-high strength concrete (UHSC) that’s exclude the coarse aggregate from its constitutive materials. In this research an experimental study had been carried out to investigate the effect of using three types of materials (porcelain aggregate) and others sustainable materials (glass waste and granular activated carbon) as a partial replacement of fine aggregate. Four percentages had considered (0, 10, 15 and 20) % to achieve better understanding for the influence of these materials upon the compressive strength of RPC. Four curing ages had included in this study, these are; 7, 28, 60 and
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More