Preferred Language
Articles
/
jcofarts-738
Form and content encryption with digital designs in women's contemporary fabrics: زينب عبد علي محسن الزبيدي
...Show More Authors

My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabrics) it reproduces and innovative design language a new form and production of various new ideas by using the designer's imagination and encrypt any encryption in the shapes and contents using computer technology and asking the following:Is it possible to obtain women's contemporary fabric designs effective encryption formats and content of subjects with the possibility of implementation in accordance with digital technology? The objective is to prepare a proposed textile designs contemporary The study identified women's contemporary fabrics designs implemented in digital technology. Chapter II may combine the theoretical framework and the previous studies and the theoretical framework may include the following: Detective Section i: 1. encrypt form and content in the design.Either section II contained digital design in contemporary fabrics.Either section III contained encrypted designs fabrics according to digital technology.Chapter III procedures for research, research methodology and specified and search tool and search forms. Out in chapter IV of the findings, conclusions and recommendations and design proposals, proposals, and one of the most important result of the research:1. built on encryption in the formal sense as in the direction of expressionist canvas.2. the aesthetic values of textile using modern methods in composition design of form design to technical codes diverse modern digital.4. characteristic designs of textile with utilitarian values achieved a large proportion comes from the aesthetic expression and content forms of cryptographic and expressive and symbolic consistency and harmony of forms and colors in sophisticated style with digital technology.5. the count of shapes and design links and content codes codes and units of semantic interpretation was accurate detail to explain the meanings of the forms and content

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 05 2024
Journal Name
Al-academy
The concept of metaphor in the contemporary sculpture
...Show More Authors

Despite the importance of this term in linguistics and rhetoric ancient and modern literary forms in general, is that it is possible to use in clarifying the foundations of the relationship hidden and manifest between shapes in models art adjacent or successive spatially, as the artwork plastic in general and sculpture in particular consists of formal structure somewhat similar to the structure in any language text and we can decode these blades structure and analyze the implications and come to their meanings and re-read and interpreted under the guidance of the concepts and techniques of neighboring developed primarily for linguistic analysis of texts or launched from their references. This split search to four chapters included the fi

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
المؤتمر العلمي الدولي الثاني للدراسات الإنسانية والاجتماعية
The Role of Digital Classroom in Education Trend and Concept
...Show More Authors

A vital instrument to foster the long-term goal of high-quality education has developed in the form of digital technologies. The educational system has been found to be significantly impacted by these technologies. The recent COVID- Pandemic has strengthened the legitimacy of using digital tools in education. The entire educational system has undergone a paradigm shift as a result of these digital technologies. Along with sharing knowledge, it also serves as a mentor, an assessor, and a co-creator of information. Students' lives have been simpler as a result of educational technology advancements. Nowadays, students prepare presentations and projects utilizing a variety of software and tools rather than pen and paper. The weig

... Show More
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No

... Show More
Scopus (19)
Scopus
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

Publication Date
Sun Mar 20 2016
Journal Name
Al-academy
Diversity of designs decorative hearts in the holy threshold Kadhimiya: سؤدد مشعان حواس
...Show More Authors

The plant decorative arts field full of decorative Baltnoat from diversity in the design structure of vocabulary and whether units sepals, vase Aogsnah or written and what their catalog decorative hearts in Kadhimiya holy threshold of diversity in shapes and measurements and sizes.It is during the field visit of the researcher found that there are variations in the overall appearance and internal padding and this researcher has formulated the discussion by asking the following problem:(What is the diversity of designs decorative hearts in Kadhimiya holy threshold?)The importance of research in it:Research contributes to open the horizons of knowledge for researchers and scholars concerned with the teaching of the decorative arts, as well

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 06 2021
Journal Name
Journal Of Planner And Development
The Ultimate Characters For Identity In Contemporary Architecture
...Show More Authors

          General propositions have dealt with various indicators and features that frame and describe basic architectural concepts, and from those concepts, the concept of identity will be presented here, which represents the nerve of intellectual vision of the state of architecture development, transformation and change. Due to its deep intellectual basis, it was necessary to study multiple features, especially the achievement feature that was considered a major stage describing the nature of change and shift related to the achievement of concept and its role in the development of the architectural field .              &nb

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 05 2020
Journal Name
Political Sciences Journal
The transformation of power in contemporary western thought
...Show More Authors

Abstract: In accordance with contemporary Western thinking, power is an organized force with a high ability to achieve stability and social security because it possesses tools based on rational organization, which helps it to control the behavior of the individual and society and prevent them from practicing the processes of exclusion and discrimination against others in pursuit of their interests and needs. Vision The philosophers and thinkers of the theory of social contract can consolidate it, which changed the form and nature of power from the traditional heritage to the constructionWhich has contributed to the development and development of civil society - Western political, and despite the success of this experiment, especially aft

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
Building the Shape in Sharif Mohieddin Haider Musical Compositions
...Show More Authors

Sharif Mohieddin Haider worked on composing of musical compositions for the Oud different from the traditional forms known as (Peşrev, Sama'i, Longa… etc.), but they are not clear in building their musical form. This study tackles this issue by revealing the structure of the building of the musical form of these Musical compositions.

        The importance of this research lies in that it provides an academic scientific study on the important subject of Musical composition forms and the way of constructing them. It helps players and students in the study of Arab music, if they want to write according to their musical form.

This research dealt with two topics in its theoretical framewo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (25)
Crossref (13)
Scopus Crossref