When the digital technologies entered the world of cinema production, they boosted the ability of the cinematographic medium to implement various subjects with great accuracy, as the development included all the joints and stages of the cinematic film production whether it is a feature film or an animation. Therefore, the process of film manufacturing by the digital technologies reflects the spirit of the age and the development that humanity has attained. What motivated the researcher to determine the topic of the research, which combines between the sound effects and the animated films under the title (aesthetics of employing digital sound effects in animated films), is the work of the digital technologies. The researcher divided his study into five sections as follows:
The methodological framework: included the research problem which is incorporated in the following question: the aesthetics of employing the digital sound effects in the animated films? The importance of the research and the need for it, the research objectives, limits, and identification of terms.
The theoretical framework: consists of two sections as follows:
The first section: digital sound effects: historical introduction: it included everything concerning the sound effects, i.e. origin, methods of employment, its technological development according the methods adopted in the construction of the sound effect. The second section: the dramatic construction of the animated films: it included the dramatic construction of the animation films. The researcher has come up with a set of indicators which represent the theoretical framework.
The research procedures: included the research methodology, research community, research sample and analysis tools in addition to the sample validation.Sample analysis: the researcher analyzed the intentional sample which is an animated film (WALL- E) directed by Andrew Stanton. Results and conclusions: it included the most prominent results the research has come up with: the digital sound effects constituted a clear aesthetic addition in the animated films through expressing the spatial environment in all its minute details as has been shown in the film (WALL- E).
The researcher listed the conclusions, recommendations and suggestions and ended the research with a list of references and appendices.
The Arabic calligraphy, in the early days of Islam, was used for the purpose of decorating the walls of mosques from inside and outside. Hence, this decorative art must be actively involved in enriching the designs of Islamic fabrics and costumes because it has a highly qualified and aesthetically pleasing look and expresses the originality of the Arab spirit. The research is divided into two section: the first section included the following topics: First "A historical overview of the art of decoration in Islamic Arab thought". Second "linear formations of decorative designs, and the subject of intellectual aesthetic taste of the art of decorating. This section tackles two subsections: first "the beauty of thought between the function an
... Show MoreAlloy of (HgTe) has been prepared succesful in evacuated qurtz ampoule at pressure 4×10-5torr, and melting temperature equal to 823K for five days. Thin films of HgTe of thickness 1μm were deposited on NaCl crystal by thermal evaporation technique at room temperature under vacuum about 4×10-5torr as well as investiagtion in the optical porperties included (absorption coefficient , energy gap) of HgTe films and The optical measurements showed that HgTe film has direct energy gap equal to 0.05 eV. The optical constants (n, k, εr, εi) have been measured over will range (6-28)μm.
Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreGiven the importance of possessing the digital competence (DC) required by the technological age, whether for teachers or students and even communities and governments, educational institutions in most countries have sought to benefit from modern technologies brought about by the technological revolution in developing learning and teaching and using modern technologies in providing educational services to learners. Since university students will have the doors to work opened in all fields, the research aims to know their level of DC in artificial intelligence (AI) applications and systems utilizing machine learning (ML) techniques. The descriptive approach was used, as the research community consisted of students from the University
... Show MoreGeographic information system (GIS) is utilized in a variety of tasks such as, resource management, urban planning, emergency planning in case of accident, and rapid response etc. The aim of this study is to produce a digital map with the aid of GIS and a survey data. A survey data is conducted with Total Station technique on sanitary planning positions. The campus of Baghdad University is chosen to test the execution and accuracy of the results for sewer manholes locations. During the field survey, Total Station (Nikon Nivo) is used to identify the 3-D coordinates for each location. Finally, Geographical Information System (GIS) are utilized to present the digital map of the network sewer pipe line to the end users. Although Geographic Inf
... Show More