End of the twentieth century witnessed by the technological evolution Convergences between the visual arts aesthetic value and objective representation of the image in the composition of the design of the fabric of new insights and unconventional potential in atypical employment. It is through access to the designs of modern fabrics that address the employment picture footage included several scenes footage from the film, which focuses on research and analytical as a study to demonstrate the elements of the picture and the organization of its rules and how to functioning in the design of fabrics, Thus, it has identified the problem by asking the following: What are the elements of the picture footage and how the functioning of the structural components in the design of fabrics? The aim of the research was "revealed the structural components of the image footage and its role in shaping the design of specific fabrics and functionally." Within the limits of research in the contracts quoted include images from the movie scenes for US films produced 1950_ 1960 and its role in the formation design custom fabrics and functional home furnishings and upholstery and of Turkish origin, produced in 2014. The second chapter the theoretical framework, the first section: the elements of the picture _ the concept, and the second topic: the image technology in the configuration design of the fabric, and the third section: Image and founded the structural design, to describe and analyze models of design fabrics, and reach research into the most important and follows the results:1. directed the picture footage into a coherent sequence to build content start the idea and the continuation of the event and ending scenes, while constructivism content associated with the design fabrics to the content of the idea are fitted regular format based on the formal vocabulary to achieve aesthetic and functional values such as the fabrics for use household upholstery placemats.2. emphasis on influencing shots in movies and choose as Marlin Monroe known figures who were at the center of a fundamental intellectual content and content in frequency came in my intention.3. confirms the correlation between The display mechanism of the image in the artistic film production and design and formulated according to data structural shape, color and values, lighting, movement and performance of the characters, which confirms the vision of producing the film depending on his time and events
تعد مجالات الصورة وعلاماتها الحركية حضوراً دلالياً للاتصال العلامي واتساعاً في الرابطة الجدلية ما بين الدوال ومداليها، التي تقوم بها الرؤية الاخراجية لإنتاج دلالات اخفائية تمتلك جوهرها الانتقالي عبر الافكار بوصفها معطيات العرض، ويسعى التشفير الصوري الى بث ثنائية المعنى داخل الحقول المتعددة للعرض المسرحي، ولفهم المعنى المنبثق من هذه التشفيرات البصرية، تولدت الحاجة لبحث تشكيل هذه التشفيرات وكيفية تح
... Show MoreSubcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and
... Show MoreIn this paper, visible image watermarking algorithm based on biorthogonal wavelet
transform is proposed. The watermark (logo) of type binary image can be embedded in the
host gray image by using coefficients bands of the transformed host image by biorthogonal
transform domain. The logo image can be embedded in the top-left corner or spread over the
whole host image. A scaling value (α) in the frequency domain is introduced to control the
perception of the watermarked image. Experimental results show that this watermark
algorithm gives visible logo with and no losses in the recovery process of the original image,
the calculated PSNR values support that. Good robustness against attempt to remove the
watermark was s
WA Shukur, FA Abdullatif, Ibn Al-Haitham Journal For Pure and Applied Sciences, 2011 With wide spread of internet, and increase the price of information, steganography become very important to communication. Over many years used different types of digital cover to hide information as a cover channel, image from important digital cover used in steganography because widely use in internet without suspicious.
JPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.
Each era has advantages in terms of innovation and development in form, technology, style, and design in ceramic vessels, both at the level of functional and aesthetic performance, so this study aimed to demonstrate the importance of geometrical foundations in the design structure of contemporary ceramic vessels, and also to reveal the constructive skills in The structure of the ceramic figure.
The researchers used the descriptive analytical approach to suit the nature of the study, and they described and analyzed the ceramic works in terms of geometric shape systems, elements and foundations of design in construction, formal diversity in the general design of ceramic vessels, and references and sources of artwork. In addition to th
To observe the effect of media of the internal pressure on the equivalent stress distribution in the tube, an experimental study is done by constructing a testing rig to apply the hydraulic pressure and three dies are manufactured with different bulging configurations (square, cosine, and conical). In the other part, ANSYS APDL is generated to analyze the bulging process with hydraulic and rubber (natural and industrial) media. It was found that when the media is a rubber, the stress is decreased about 9.068% in case of cosine die and 5.4439% in case of conical die and 2.8544% in case of square die. So, it can be concluded that the internal pressure in the rubber media is much better than in hydraulic media. Also, the force needed for fo
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show More