تعد مجالات الصورة وعلاماتها الحركية حضوراً دلالياً للاتصال العلامي واتساعاً في الرابطة الجدلية ما بين الدوال ومداليها، التي تقوم بها الرؤية الاخراجية لإنتاج دلالات اخفائية تمتلك جوهرها الانتقالي عبر الافكار بوصفها معطيات العرض، ويسعى التشفير الصوري الى بث ثنائية المعنى داخل الحقول المتعددة للعرض المسرحي، ولفهم المعنى المنبثق من هذه التشفيرات البصرية، تولدت الحاجة لبحث تشكيل هذه التشفيرات وكيفية تحولها لصور بصرية. وتناول الباحثان في المقدمة مشكلة البحث، وهي: كيف تتم عملية التشفير الصوري والدلالي في العرض المسرحي؟ وتتبع اثراء العلامات وشفراتها لانتاج منظومه صورية متكاملة بدلالاتها ومداليلها لتمثل مرجعاً خصباً للتشفير الدلالي وقد اسسا الباحثان اطارا نظريا تضمن مبحثان هما: المبحث الاول(التشفير وانتاج الدلالات) والمبحث الثاني (التشفير الدلالي في التجارب الاخراجية), ثم استقى الباحثان مجموعة مؤشرات تم اعتمادها في تحليل عينة البحث، وهي (مجموعة من النصوص تم ادخالها في نص واحد وتم عرضها في المسرح بطريقة المسرح الأسود)، على وفق المنهج الوصفي، وبعدها توصل الباحثان الى مجموعة نتائج منها: (اسهمت الايماءة والصوت والحركة في جعل الدوال اداةً فاعلة في تشكيل الصورة البصرية المشفرة، والتي انتجت انتشاراً دلالياً في العرض المسرحية), ثم قائمة المصادر وملخص باللغة الانكليزية.
A new computer-generated optical element called a monochrome image hologram (MIH) is described. A real nonnegative function to represent the transmittance of a synthesized hologram is used. This technique uses the positions of the samples in the synthesized hologram to record the phase information of a complex wavefront. Synthesized hologram is displayed on laser printer and is recorded on a film. Finally the reconstruction process is done using computerized .
. The concepts of structural flexibility became one of the important goals in the design phases to reach high performance in architecture. The pioneering projects and ideas that linked architecture with technologies and scientific innovations appeared, with the aim of reaching projects that mix the concepts of flexibility with the development of machine thought and modern technology to meet the functional, environmental, and aesthetic requirements for human wellbeing. The aim of this paper is to identify the mechanisms used in order to reach flexible structural systems capable of accommodating technological changes and developments. The research hypothesizes that the structural design according to the concepts of flexibility achieves high s
... Show MoreDespite the artistic importance that Assumption intertextuality in technical studies, it is indispensable for the artist and writer whatever, Intertextuality s is not a coincidence, is not correct to be so, so that human culture is governed by Trait obstetrics and conclusion shows and the longer the life of culture, whatever it be more fortunate the correlation between the present and the past. From this point the problem of current research was founded in the detection of overlapping contexts in contemporary art between intertextuality and quotation, and concluded by identifying the most important terms in the search, while the second chapter highlighted the intertextuality in contemporary artistic discourse and the types of intertextua
... Show MoreHowever, the effects of these ideas are still evident
Think of those who follow the footsteps of Muslim scholars and thinkers.
Intellectual source of Gnostic Gnar
And in dealing with issues of Islamic thought
Annalisa intersecting trends of thought, Minya who melts in Masarya and supported him and believes in Bo and extremist Vue,
Lea, trying to throw it with a few times, looks at Elya look
There are those who stand in the opposite position
There are those who stand in a selective compromise, but this school of thought remains
G - the features of Islamic thought that believes in the mind and Imoto in the defense of
An intellectual station and generalized bar
Creed. In his study, the researcher wi
In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
Image segmentation can be defined as a cutting or segmenting process of the digital image into many useful points which are called segmentation, that includes image elements contribute with certain attributes different form Pixel that constitute other parts. Two phases were followed in image processing by the researcher in this paper. At the beginning, pre-processing image on images was made before the segmentation process through statistical confidence intervals that can be used for estimate of unknown remarks suggested by Acho & Buenestado in 2018. Then, the second phase includes image segmentation process by using "Bernsen's Thresholding Technique" in the first phase. The researcher drew a conclusion that in case of utilizing
... Show MoreBackground: Determination of sex and estimation of stature from the skeleton is vital to medicolegal investigations. Skull is composed of hard tissue and is the best preserved part of skeleton after death, hence, in many cases it is the only available part for forensic examination. Lateral cephalogram is ideal for the skull examination as it gives details of various anatomical points in a single radiograph. This study was undertaken to evaluate the accuracy of digital cephalometric system as quick, easy and reproducible supplement tool in sex determination in Iraqi samples in different age range using certain linear and angular craniofacial measurements in predicting sex. Materials and Method The sample consisted of 113of true lateral cepha
... Show More