89 resultados para Nasir-Mohammed, Sultan of Egypt, 1284-1341.

em Queensland University of Technology - ePrints Archive


Relevância:

40.00% 40.00%

Publicador:

Resumo:

En route from Birmingham to Syria in 2013, British-Jihadi neophytes aged 22, Yusuf Sarwar and Mohammed Ahmed purchased two books via Amazon to prepare for their mission in Syria after joining ISIS: The Koran for Dummies and Islam for Dummies. Journalists were swift to disparage their reading. The book’s author, Princeton University campus imam, Sohaib Nazeer Sultan remarked “Even though they may have ordered it, I don't think they read it.” In 1933, aged 27, Adolf Eichmann moved to Berlin to join the Sicherheitsdienst SD whereupon he read Immanuel Kant’s book the Kritik der praktischen Vernunft (The Critique of Practical Reason) for the first time. After his trial in Jerusalem, Hannah Arendt of course dismissed Eichmann’s reading of the German philosopher as thoroughly vacuous. Ever since, writers have sought to undermine the veracity of Eichmann’s account. The global Jihadis are illiterate, a journalist recently commented: they’re not well read in the Qur’an, and if they have read it, they have thoroughly misunderstood it. He cited as evidence Abdul Raqib Amin’s YouTube rhetorical: Forget everyone. Read the Koran, read the instruction of life. Find out what is jihad. Eichmann on the other hand was not illiterate in his youth. Before Berlin, he had already read Kant’s Groundwork of the Metaphysics of Morals ; he would also re-read the Critique of Practical Reason, and from his testimony and terminology we can infer he was familiar with Kantian concepts that extend beyond both books...

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A complete series of cross-sectional computed tomography (CT) scans were obtained of a mummy of an Egyptian priestess, Tjenmutengebtiu, (Jeni), who lived in the twenty-second Dynasty (c. 945-715 BC). The purpose of this joint British Museum and St. Thomas’ Hospital project was effectively to ‘unwrap’ a mummy using cross-sectional X-rays. Jeni is encased in a beautifully decorated anthropomorphic cartonnage coffin. The head and neck were scanned with 2mm slices, the teeth with 1mm slices and the rest of the body with 4 mm slices, a 512 x 512 matrix was used. The 2D CT images, and 3D surface reconstruction’s, demonstrate many features of the embalming techniques and funerary customs of the XXII Dynasty. The presence of cloth protruding from the nasal cavities into the otherwise empty cranial cavity indicates that the brain was extracted via the nose. The remains of the heart can be seen as well as four organ packs corresponding to the mummified and repackaged lungs, intestines, stomach and liver. Each of the organ packs encloses a wax figurine representing one of the four sons of Horus. The teeth are in very good condition with little signs of wear, which, considering the gritty diet of the Egyptians, indicates that Jeni must have been very young when she died. A young age of death is also suggested by analysis of the shape of the molar teeth. The body is generally in very good condition demonstrating the consummate skill of the twenty-second Dynasty embalmers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Over the last few years various research groups around the world have employed X-ray Computed Tomography (CT) imaging in the study of mummies – Toronto-Boston (1,2), Manchester(3). Prior to the development of CT scanners, plane X-rays were used in the investigation of mummies. Xeroradiography has also been employed(4). In a xeroradiograph, objects of similar X-ray density (very difficult to see on a conventional X-ray) appear edge-enhanced and so are seen much more clearly. CT scanners became available in the early 1970s. A CT scanner produces cross-sectional X-rays of objects. On a conventional X-radiograph individual structures are often very difficult to see because all the structures lying in the path of the X-ray beam are superimposed, a problem that does not occur with CT. Another advantage of CT is that the information in a series of consecutive images may be combined to produce a three-dimensional reconstruction of an object. Slices of different thickness and magnification may be chosen. Why CT a mummy? Prior to the availability of CT scanners, the only way of finding out about the inside of a mummy in any detail was to unwrap and dissect it. This has been done by various research groups – most notably the Manchester, UK and Pennsylvania University, USA mummy projects(5,6). Unwrapping a mummy and carrying out an autopsy is obviously very destructive. CT studies hold the possibility of producing a lot more information than is possible from plain X-rays and are able to show the undisturbed arrangement of the wrapped body. CT is also able to provide information about the internal structure of bones, organ packs, etc that wouldn’t be possible without sawing through the bones etc. The mummy we have scanned is encased in a coffin which would have to have been broken open in order to remove the body.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Several specimens of Libyan Desert Glass (LDG), an enigmatic natural glass from Egypt, were subjected to investigation by micro-Raman spectroscopy. The spectra of inclusions inside the LDG samples were successfully measured through the layers of glass and the mineral species were identified on this basis. The presence of cristobalite as typical for high-temperature melt products was confirmed, together with co-existing quartz. TiO2 was determined in two polymorphic species, rutile and anatase. Micro-Raman spectroscopy proved also the presence of minerals unusual for high-temperature glasses such as anhydrite and aragonite.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Distributed Denial of Services DDoS, attacks has become one of the biggest threats for resources over Internet. Purpose of these attacks is to make servers deny from providing services to legitimate users. These attacks are also used for occupying media bandwidth. Currently intrusion detection systems can just detect the attacks but cannot prevent / track the location of intruders. Some schemes also prevent the attacks by simply discarding attack packets, which saves victim from attack, but still network bandwidth is wasted. In our opinion, DDoS requires a distributed solution to save wastage of resources. The paper, presents a system that helps us not only in detecting such attacks but also helps in tracing and blocking (to save the bandwidth as well) the multiple intruders using Intelligent Software Agents. The system gives dynamic response and can be integrated with the existing network defense systems without disturbing existing Internet model. We have implemented an agent based networking monitoring system in this regard.