The study examines the religious references of the art of miniatures in the Iranian school "Bahzad model" completed in Iran during the twelfth century AH, according to the controls and characteristics of the authoritative references. The researcher presented the problem of research, its importance, the need for it and its purpose, defined the terms in the research. The theoretical framework came with three investigations. The first topic of the concept of the reference in the field of knowledge, which concluded the most important features of the reference, is that each symbolic existence corresponds to a real existence and symbolic presence is an input to the realization of the reference. The reference then becomes a sign that acts as a holding entity for the semantics, and the receiver draws through the reference about the cognitive background associated with the text. The second topic, the Islamic art, its characteristics and its components, is a title for it, and what distinguishes Islamic art with characteristics unique to it is religious art. The third topic reviewed the most important Iranian schools in the art of photography. The results of the research came to analyze the selected models of the works of the miniatures artist (Behzad). The results of the research were achieved for its purpose, the most important of which is the arrangement of the photographic composition and the portrayal of human forms of different sizes according to social and religious status.
Emotional blackmail is generally defined as manipulating others' emotions for personal gain. It is a type of manipulation that damages healthy relationships among people and turns them into toxic relations leaving the victim in a state of depression and under stress of losing something s/he holds dear. This study aims to identify the pragmatic techniques of emotional blackmail used by both blackmailers and victims in "No One Would Tell" (2018). To do so, the researchers developed an eclectic model comprising Forward and Frazier's (1997) emotional blackmail, Searle’s speech acts (1979), Brown and Levinson’s politeness strategies (1987), Culpeper’s impoliteness strategies (1996, 2005), and Mayfield's taxonomy of fallacy (2007)
... Show MoreThis abstract focuses on the significance of wireless body area networks (WBANs) as a cutting-edge and self-governing technology, which has garnered substantial attention from researchers. The central challenge faced by WBANs revolves around upholding quality of service (QoS) within rapidly evolving sectors like healthcare. The intricate task of managing diverse traffic types with limited resources further compounds this challenge. Particularly in medical WBANs, the prioritization of vital data is crucial to ensure prompt delivery of critical information. Given the stringent requirements of these systems, any data loss or delays are untenable, necessitating the implementation of intelligent algorithms. These algorithms play a pivota
... Show MoreThis paper reports an experimental study regarding the influence of vertical oscillations on the natural convection heat transfer from a vertical channel. An experimental set-up was constructed and calibrated; the vertical channel was tested in atmosphere at 25o
C. The channel-to-ambient temperature difference was varied with the power supply to the electrical heater ranging between
15W to 70W divided into five levels. Data sets were measured under different operating condition from a test rig under six vibrating velocities (VVs) levels ranging from (5-30 m/s) in addition to the stationary state. The results show that the maximum heat transfer enhancement factor (E) occurs at Rayleigh number (Ra=2.328×103 ) and vibrational Reynol
A novel analytical method is developed for the determination of azithromycin. The method utilizes continuous flow injection analysis to enhance the chemiluminescence system of luminol, H2O2, and Cr(III). The method demonstrated a linear dynamic range of 0.001–100 mmol L-1 with a high correlation coefficient (r) of 0.9978, and 0.001–150 mmol L-1 with a correlation coefficient (r) of 0.9769 for the chemiluminescence emission versus azithromycin concentration. The limit of detection (L.O.D.) of the method was found to be 18.725 ng.50 µL−1 based on the stepwise dilution method for the lowest concentration within the linear dynamic range of the calibration graph. The relative standard deviation (R.S.D. %) for n = 6 was less than 1.2%
... Show MoreI was invited to deliver a research paper on orphan care at the Center for Psychological and Educational Research. So I sought help from God Almighty and began writing a research in which I explained the meaning of the orphan, his condition, and the Holy Qur’an’s care for him. Therefore, I intended for the title of my humble research to be (Caring for the Orphan in the Islamic Perspective), since the papers were mixed up in the time of accidents, disasters, and deadly weapons, all of which reap men more than what we suffer. In this wounded country of ours, with civil wars, sectarianism, and insecurity, research began to solve the problem of orphans at a time when society had become an orphan with no shepherd. When I addressed this to
... Show MoreThe right of the patient to know the medical risks surrounding the medical intervention is one of the most prominent rights based on the principle of "physical safety", which has undergone several stages of development until it reached the development of the patient's independence in making medical decision without relying on the doctor, The patient's prior informed consent is informed of his / her medical condition. We will study this development in accordance with the French March 4, 2002 legislation on the rights of patients in the health system, whether it was earlier and later. We will highlight the development of the patient's right to "know the medical risks surrounding medical intervention" The legislation and its comparison with th
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs