Preferred Language
Articles
/
jcofarts-738
Form and content encryption with digital designs in women's contemporary fabrics: زينب عبد علي محسن الزبيدي
...Show More Authors

My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabrics) it reproduces and innovative design language a new form and production of various new ideas by using the designer's imagination and encrypt any encryption in the shapes and contents using computer technology and asking the following:Is it possible to obtain women's contemporary fabric designs effective encryption formats and content of subjects with the possibility of implementation in accordance with digital technology? The objective is to prepare a proposed textile designs contemporary The study identified women's contemporary fabrics designs implemented in digital technology. Chapter II may combine the theoretical framework and the previous studies and the theoretical framework may include the following: Detective Section i: 1. encrypt form and content in the design.Either section II contained digital design in contemporary fabrics.Either section III contained encrypted designs fabrics according to digital technology.Chapter III procedures for research, research methodology and specified and search tool and search forms. Out in chapter IV of the findings, conclusions and recommendations and design proposals, proposals, and one of the most important result of the research:1. built on encryption in the formal sense as in the direction of expressionist canvas.2. the aesthetic values of textile using modern methods in composition design of form design to technical codes diverse modern digital.4. characteristic designs of textile with utilitarian values achieved a large proportion comes from the aesthetic expression and content forms of cryptographic and expressive and symbolic consistency and harmony of forms and colors in sophisticated style with digital technology.5. the count of shapes and design links and content codes codes and units of semantic interpretation was accurate detail to explain the meanings of the forms and content

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Different Estimators for the shape Parameter and the Reliability function of Kumaraswamy Distribution
...Show More Authors

In this paper, we used maximum likelihood method and the Bayesian method to estimate the shape parameter (θ), and reliability function (R(t)) of the Kumaraswamy distribution with two parameters l , θ (under assuming the exponential distribution, Chi-squared distribution and Erlang-2 type distribution as prior distributions), in addition to that we used method of moments for estimating the parameters of the prior distributions. Bayes

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2002
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Variation of digital dermatoglyphics in females of northern Iraq
...Show More Authors

The digital dermatoglyphics were studied in 120 females derived from northern region of Iraq (60 Arabs and 60 Kurds). Two kinds of analyses were perfomed : Quantitative and Qualtative. The unilateral and bilateral analyses for dermal ridge counts in each digital and the overall did not reveal any significant difference when t-test was used. A high correlation coefficients were revealed in this study between homologous and adjacent digits, moreover, significant differences were revealed between Arabian and Kurdish samples in both analyses when Fisher Z transform test was used, but the significant differences in the bilateral analysis exceed the ones in the unilateral. This indicates the importance of the former analysis in detecting the vari

... Show More
Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Al–bahith Al–a'alami
Exposure Habits of Female College Students for women's Programs in the Satellite and its Relationship to the Promotion of Family Values
...Show More Authors

The status of women in any society is one of the basic criteria for measuring the degree of progress that society and follow renaissance march side by sidewith men , and is no doubt that women are now of interest to the state , even if limited , which promotes public ideologies on the need for womens participation in economic infrastructure operations and social and the right to gain information and knowledge, entertainment and exercise its role in development through its president and actor in the family and raising the next generation configuration.

And affect the basic tributaries that draws them women information and ideas have a direct impact on the composition of cultural and cognitive entity woman comes satellite channels

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Formal trespass and its intellectual manifestations in the contemporary interior space: ريم باسل نوري
...Show More Authors

The Interior design is concerned with designing and creating internal spaces and reformulating their ideas, thus separating their capacities for influence and achieving suitability and comfort for their occupants, and enabling them to use them in a manner that achieves their goals and requirements, and this is unfolded by the integrity of the functional, aesthetic and expressive performance that these spaces achieve, The behavior of its users includes a variety of activities in harmony with the influence of those spaces and their forms, so the designer was keen to have these spaces in a form with an effective role in harmony with the needs of the times and its complexities in formation and construction, familiar with the strong cultural,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
The Situation of Refugees and Displaced Women in Arab Countries during Conflicts According to the Perspective of the Arab Women's Organization
...Show More Authors

Abstract

The scope of the humanitarian tragedies in the Arab region has widened after the conflicts that erupted over the past years, exacerbation to include educational, cultural, and social dimensions, economic and moral aspects of the displaced families, especially after the emergence of terrorist organizations and sectarian conflicts which overthrew human and led to various political and demographic changes, forcing citizens to leave their homes, fleeing with their families from the danger of murder, terrorism, and violation to other safer areas inside or outside their countries. Women and children were the vast majority of the displaced who were subjected to great pressures, The host communities bore the pro

... Show More
View Publication
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
Class consciousness in the contemporary Marxist political thought (selected models)
...Show More Authors

Class consciousness represents its highest stage in the contemporary Marxist thought of Rosa Luxemburg and Antonio Gramsci, not just a reflection of reality, but rather a dialectical form through the reflection of consciousness on reality and its reproduction. The superiority over the infrastructure (historical materialism) promised the revolutionary class consciousness to be achieved spontaneously, and the seeds of a breakthrough are mass strikes, denying the role of the party to organize this awareness, limiting its role to the interconnection between classes, emphasizing the role of socialist democracy as a conscious vanguard for organizing spontaneity, struggle, and developing awareness during the revolutionary process and the leader

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Sep 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Validity of Digital and Rapid Prototyped Orthodontic Study Models
...Show More Authors

Background: The integration of modern computer-aided design and manufacturing technologies in diagnosis, treatment planning, and appliance construction is changing the way in which orthodontic treatment is provided to patients. The aim of this study is to assess the validity of digital and rapid prototyped orthodontic study models as compared to their original stone models. Materials and methods: The sample of the study consisted of 30 study models with well-aligned, Angle Class I malocclusion. The models were digitized with desktop scanner to create digital models. Digital files were then converted to plastic physical casts using prototyping machine, which utilizes the fused deposition modeling technology. Polylactic acid polymer was chose

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Sufian Symbol and its significance in Abd Allah Hamadi's Poetry
...Show More Authors

This research paper looks to put its hands on sufi symbols which are applied by the algerian poet د abdallah hammadi د in his poetical works . the symbols it relies on are : ( symbolisme of wine . symbolisme of light . symbolisme of night . sufisme and nature , femal symbols ) .
From these symbols we try to show its range of ability to apply it , with trying to determine its meaningful , dimensions .

View Publication Preview PDF