Examining the development of ancient iron furnaces and the reconstruction of ancient iron production through experimental work - focusing on examples from European archaeology -

2017 ◽  
Vol 38 ◽  
pp. 47-76
Author(s):  
Dae Youn Cho ◽  
Author(s):  
Jane Humphris

The archaeometallurgical remains evident at the Royal City of Meroe represent some of the most extensive evidence for ancient iron production in Africa. Recently, renewed investigations of these remains have generated a number of new insights into Kushite ferrous technology. The duration of iron production at Meroe is now known to span over one thousand years. Currently available data indicates a particularly intensive level of production during the early periods of Kush, while post-Meroitic iron production has been identified at Meroe and at the nearby site of Hamadab. Throughout the long history of iron production in the area, certain aspects of the technological process appear to have remained relatively constant, notably those associated with the acquisition and use of raw materials (iron ore and charcoal fuel). Other facets of the technological practice appear to have changed over time, for example the manufacture of technical ceramics and the design of the furnaces. Such levels of diachronic consistency and variability within technological practice potentially reflect the evolving social, political, and economic circumstances of Kush. Due to the socio-politically embedded nature of technology, interesting insights into broader Kushite history are becoming accessible through greater understandings of Meroe’s iron production remains.


2019 ◽  
pp. 22-27
Author(s):  
Cenk Yavuz ◽  
Ceyda Aksoy Tırmıkç ◽  
Burcu Çarklı Yavuz

Today the number of office workers has reached to an enormous number due to the fast-growing technology. Most of these office workers spend long hours in enclosed spaces with little/no daylight penetration. The lack of daylight causes physiological and psychological problems with the workers. At this point lighting systems become prominent as the source and the solution of the problem. Photometric flicker event which arises in the lighting systems can sometimes become visible and brings a lot of issues with it. In this paper, an experimental work has been done to investigate the effect of flicker. For this purpose, the flicker values of 3 different experiment rooms for different lighting conditions and scenarios have been measured and a questionnaire study has been carried out in the experiment rooms with 30 participants. In conclusion, the effect of the flicker event on the volunteers have been classified and some methods have been proposed not to experience flicker effects.


2014 ◽  
Vol 52 (3) ◽  
pp. 225-231 ◽  
Author(s):  
Hyun Kyung Cho ◽  
Nam Chul Cho ◽  
Hun Lee
Keyword(s):  

2019 ◽  
Vol 7 (1) ◽  
pp. 10-18
Author(s):  
Tsvetanka Tsenova

This article focuses on the relationship between literacy methods applied at school and the emergence of serious difficulties in mastering reading and writing skills that shape the developmental dyslexia. The problem was analyzed theoretically and subjected to empirical verification. Experimental work was presented which aims to study the phonological and global reading skills of 4- th grade students with and without dyslexia. Better global reading skills have been demonstrated in all tested children, and this is much more pronounced in those with dyslexia than their peers without disorders. Hence, the need to develop a special, corrective methodology for literacy of students with developmental dyslexia consistent with their psychopathological characteristics.


Author(s):  
Satvir Singh

Steganography is the special art of hidding important and confidential information in appropriate multimedia carrier. It also restrict the detection of  hidden messages. In this paper we proposes steganographic method based on dct and entropy thresholding technique. The steganographic algorithm uses random function in order to select block of the image where the elements of the binary sequence of a secret message will be inserted. Insertion takes place at the lower frequency  AC coefficients of the  block. Before we insert the secret  message. Image under goes dc transformations after insertion of the secret message we apply inverse dc transformations. Secret message will only be inserted into a particular block if  entropy value of that particular block is greater then threshold value of the entropy and if block is selected by the random function. In  Experimental work we calculated the peak signal to noise ratio(PSNR), Absolute difference , Relative entropy. Proposed algorithm give high value of PSNR  and low value of Absolute difference which clearly indicate level of distortion in image due to insertion of secret message is reduced. Also value of  relative entropy is close to zero which clearly indicate proposed algorithm is sufficiently secure. 


Sign in / Sign up

Export Citation Format

Share Document