Search results for: Gebel el-Arak Knife
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3

Search results for: Gebel el-Arak Knife

3 Theory about the Gebel El-Arak Knife: An Egyptian Knife with Canaanite Relief

Authors: Doaa El-Shereef

Abstract:

Gebel Al-Arak knife with its fine engravings on the two faces of the handle is the proof about the relationship between the Egyptians and the Canaanites during Naqada II. The Canaanites lived with the Egyptians in Abydos and they fought each other for power and the war scene on the knife prove that the Canaanites and the Egyptians wore the same outfit and they are only different by their hair style. The research discusses and analyzes many primary sources in Egypt, like wall inscriptions and palettes that prove the strong land relation and sea trade between Canaan and Egypt during Chalcolithic Age (4500-3500 BC). While no primary sources in Egypt prove the relationship between Egypt and Mesopotamia in the period to which the knife of Gebel Al-Arak belongs, between 3300-3100 BC, there were no battles or maritime trade exchanges between them. The engravings on the knife belong to the Canaanites and their God El (Master of Animals) and describing their victory over the Egyptians in this amphibious battle. The research aims to prove a theory that the Gebel Al-Arak knife is an Egyptian-made knife and the influences of the knife engravings were Canaanite, not Mesopotamian. The methodology of the study is historical methodology which is used to gather and analyze evidence and various historical data retrieved from history and interpret what the evidence reveals about things that occurred in history.

Keywords: Canaan, Egypt, Gebel el-Arak Knife, Louvre.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 386
2 The Effect of the Tool Geometry and Cutting Conditions on the Tool Deflection and Cutting Forces

Authors: A. Fata, B. Nikuei

Abstract:

In this paper by measuring the cutting forces the effect of the tool shape and qualifications (sharp and worn cutting tools of both vee and knife edge profile) and cutting conditions (depth of cut and cutting speed) in the turning operation on the tool deflection and cutting force is investigated. The workpiece material was mild steel and the cutting tool was made of high speed steel. Cutting forces were measured by a dynamometer (type P.E.I. serial No 154). The dynamometer essentially consisted of a cantilever structure which held the cutting tool. Deflection of the cantilever was measured by an L.V.D.T (Mercer 122) deflection indicator. No cutting fluid was used during the turning operations. A modern CNC lathe machine (Okuma LH35-N) was used for the tests. It was noted that worn vee profile tools tended to produce a greater increase in the vertical force component than the axial component, whereas knife tools tended to show a more pronounced increase in the axial component.

Keywords: Cutting force, Tool deflection, Turning, Cuttingconditions.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3308
1 Net-Trainer-ST: A Swiss Army Knife for Pentesting, Based on Single Board Computer, for Cybersecurity Professionals and Hobbyists

Authors: K. Hołda, D. Śliwa, K. Daniec

Abstract:

This article was created as part of the developed master's thesis. It attempts to present a developed device, which will support the work of specialists dealing with broadly understood cybersecurity terms. The device is contrived to automate security tests. In addition, it simulates potential cyberattacks in the most realistic way possible, without causing permanent damage to the network, in order to maximize the quality of the subsequent corrections to the tested network systems. The proposed solution is a fully operational prototype created from commonly available electronic components and a single board computer. The focus of the article is not only put on the hardware part of the device but also on the theoretical and applicatory way in which implemented cybersecurity tests operate and examples of their results.

Keywords: Raspberry Pi, ethernet, automated cybersecurity tests, ARP, DNS, backdoor, TCP, password sniffing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 708