The current challenge facing our age is the information digitization, at the same time, there is a huge development in the interdisciplinary of technologies with sciences. In the last few years, the World witnessed a number of information challenges with different dimensions, including digital dimensions, which are called the digital world and the virtual world for authors and movie writers. Consequently, the digital art concept emerged that utilizes the computer in an efficient way and as a new technique for drawing. This art is considered a great leap for modern art. The influence of digital technology transformed traditional arts like painting and sculpture into new forms, from pure arts to virtual reality. The most important characteristics and advantages are reflected in saving time, effort, cost and area. Digitally, art would enrich Iraqi culture by employing Iraqi creativity. This paper targets the concept of digital art, characteristics of art in virtual society and presenting the history – origins and evolution – of digital art. A group of paintings have been created using Photoshop Cc, Photo Shop C5 and Art Rage programs.
Architecture has evolved through the ages as forms, relationships, materials and mechanisms according to the data of each era and up to the era of digital technology, where the change in proportions and aesthetic dimensions of contemporary architectural formation due to the capabilities of digitization has created innovative plastic properties using the void formation in the facades and the introduction of void as a formative and aesthetic element, which led to The emergence of new creative concepts and ideas that contradict traditional ideas and are consistent with the spirit of the times, led to a revolution in the world of architectural form at the level of (architectural ideas and the generation of shapes, materials and construction
... Show MoreThis study aimed to identify the role of digital transformation in improving the quality of the internal audit process. The researchers used the descriptive analytical approach, and the questionnaire was relied on as a study tool that was applied to the study population consisting of internal auditors working in banks listed on the Palestine Stock Exchange, and their number was (85). A checker and a comprehensive inventory method was used due to the small size of the community, where the response data of the questionnaire was analyzed and interpreted using the Statistical Packages Program (SPSS).
The results of the study showed that the use of digital transformation contributes to ensuring the quality of
... Show MoreThis research deals with the use of a number of statistical methods, such as the kernel method, watershed, histogram and cubic spline, to improve the contrast of digital images. The results obtained according to the RSME and NCC standards have proven that the spline method is the most accurate in the results compared to other statistical methods
Orthophoto provides a significant alternative capability for the presentation of architectural or archaeological applications. Although orthophoto production from airphotography of high or lower altitudes is considered to be typical, the close range applications for the large-scale survey of statue or art masterpiece or any kind of monuments still contain a lot of interesting issues to be investigated.
In this paper a test was carried out for the production of large scale orthophoto of highly curved surface, using a statue constructed of some kind of stones. In this test we use stereo photographs to produce the orthophoto in stead of single photo and DTM, by applying the DLT mathematical relationship as base formula in differenti
... Show MoreThe principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreMy research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabr
... Show MoreGiven the growing interest in digital marketing operations and the technology imposed by the reality in which both companies and their customers are affected, the researchers attempted to shed light on the reality and challenges of digital marketing from the faculty members viewpoint at Jouf university, the problem is that technology has imposed a new reality that has resulted in a major change in behavioral patterns of customers with a number of obstacles and challenges confronted customers in digital marketing, it is expected that the outcomes of this study help companies in overcoming the obstacles that prevent the desire and ability of the customer to change his behavioral style to deal with electronic shopping operations and
... Show MoreThe aim of this paper is to compare between classical and fuzzy filters for removing different types of noise in gray scale images. The processing used consists of three steps. First, different types of noise are added to the original image to produce a noisy image (with different noise ratios). Second, classical and fuzzy filters are used to filter the noisy image. Finally, comparing between resulting images depending on a quantitative measure called Peak Signal-to-Noise Ratio (PSNR) to determine the best filter in each case.
The image used in this paper is a 512 * 512 pixel and the size of all filters is a square window of size 3*3. Results indicate that fuzzy filters achieve varying successes in noise reduction in image compared to
NGC 6946 have been observed with BVRI filters, on October 15-18,
2012, with the Newtonian focus of the 1.88m telescope, Kottamia
observatory, of the National Research Institute of Astronomy and
Geophysics, Egypt (NRIAG), then we combine the BVRI filters to
obtain an astronomical image to the spiral galaxy NGC 6946 which
is regarded main source of information to discover the components of
this galaxy, where galaxies are considered the essential element of
the universe. To know the components of NGC 6946, we studied it
with the Variable Precision Rough Sets technique to determine the
contribution of the Bulge, disk, and arms of NGC 6946 according to
different color in the image. From image we can determined th