Preferred Language
Articles
/
jcofarts-738
Form and content encryption with digital designs in women's contemporary fabrics: زينب عبد علي محسن الزبيدي
...Show More Authors

My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabrics) it reproduces and innovative design language a new form and production of various new ideas by using the designer's imagination and encrypt any encryption in the shapes and contents using computer technology and asking the following:Is it possible to obtain women's contemporary fabric designs effective encryption formats and content of subjects with the possibility of implementation in accordance with digital technology? The objective is to prepare a proposed textile designs contemporary The study identified women's contemporary fabrics designs implemented in digital technology. Chapter II may combine the theoretical framework and the previous studies and the theoretical framework may include the following: Detective Section i: 1. encrypt form and content in the design.Either section II contained digital design in contemporary fabrics.Either section III contained encrypted designs fabrics according to digital technology.Chapter III procedures for research, research methodology and specified and search tool and search forms. Out in chapter IV of the findings, conclusions and recommendations and design proposals, proposals, and one of the most important result of the research:1. built on encryption in the formal sense as in the direction of expressionist canvas.2. the aesthetic values of textile using modern methods in composition design of form design to technical codes diverse modern digital.4. characteristic designs of textile with utilitarian values achieved a large proportion comes from the aesthetic expression and content forms of cryptographic and expressive and symbolic consistency and harmony of forms and colors in sophisticated style with digital technology.5. the count of shapes and design links and content codes codes and units of semantic interpretation was accurate detail to explain the meanings of the forms and content

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 19 2017
Journal Name
Al-academy
Directed designs the covers of children's magazines methods
...Show More Authors

The design processes in general and the design system in particular need to be studied and knowledge. Based on this vision, we find the need for constant research on the design processes, and the subject of the techniques of the designs of the covers of children magazines did not have the view of the researchers to make them the subject of study, For the subject of this research, the problem of research is determined according to the following question:

- What are the methods used in designing children magazine covers in Iraq?

Through this research we seek to find solutions to this question as well as it will serve the cognitive side of a modern study and development of a broader understanding of the subject. Through four

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
Extraction and Application of Natural Colourant from the Bark of Berlinia Grandiflora on Cotton and Polyamide 6 Fabrics
...Show More Authors

The aim of this study is to extract and utilise the bark of Berlinia grandiflora as a natural dye source for the colouration of cotton and polyamide 6 fabrics. The solvents used for this study were water, methanol, acetone, and methanol/potassium hydroxide. The best of all the solvents used was water. In the extraction process, the various solvents were extracted with Soxhlet extractor.  The optimum colourant extraction was observed at 40 °C for 2 h.  The extracted compound was isolated and characterized by UV spectrophotometry; proton and carbon-13 nuclear magnetic resonance, mass spectrometry, and Fourier transform infrared spectroscopy.  Mordanting and subsequent dyeing of cotton and polyamide 6 fabrics with t

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Oct 01 2006
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Bone Marrow Reticulin Content In Acute Leukemia
...Show More Authors

Background: Increase in marrow reticulin has long been recognized in primary myelofibrosis, but little was known about the reticulin structure of leukemic marrows, there has been a tendency to accept an increase in marrow reticulin as evidence of myelofibrosis. Similarly, there has been a tendency to diagnose as "acute myelofibrosis" cases of acute leukemia with brisk reticulin and early collagen production. This study was undertaken to determine incidence, type and pattern of fibrosis in the bone marrow of patients with acute leukemia, both acute lymphoblastic and acute myeloid leukemia.
Method: thirty-five bone marrow biopsy specimens from patients with acute leukemia were examined histologically; connective tissue stains were appli

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Sustainability by recycling palm waste in designing women's belts: وفاء حسن شافعي -مرام زيد الحربي
...Show More Authors

This research contributes to environmental sustainability by recycling natural waste resources in making clothing products. The research aims to employ palm trees waste in designing belts suitable for contemporary women's fashion trends. Both descriptive and applied research approaches were used. Therefore, a collection of belts was designed and implemented. Then, a questionnaire was used to assess the extent to which the implemented belts achieved in sustainability standards using Likert scale. The sample size was 60 women. The data were analyzed using the SPSS program to calculate the arithmetic mean and standard deviation. One of the significant results of the research is the high average scores of the criteria for achieving sustainab

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 25 2022
Journal Name
Iraqi Journal Of Science
Medical Image Compression and Encryption Using Adaptive Arithmetic Coding, Quantization Technique and RSA in DWT Domain
...Show More Authors

Nowadays, the advances in information and communication technologies open the wide door to realize the digital world’s dream. Besides, within the clear scientific scope in all fields, especially the medical field, it has become necessary to harness all the scientific capabilities to serve people, especially in medical-related services. The medical images represent the basis of clinical diagnosis and the source of telehealth and teleconsultation processes. The exchange of these images can be subject to several challenges, such as transmission bandwidth, time delivery, fraud, tampering, modifying, privacy, and more. This paper will introduce an algorithm consisting a combination of compression and encryption techniques to meet such chall

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
mRNA Approach Image Encryption Using LUC Algorithm
...Show More Authors

      Bioinformatics is one of the computer science and biology sub-subjects concerned with the processes applied to biological data, such as gathering, processing, storing, and analyzing it. Biological data (ribonucleic acid (RNA), deoxyribonucleic acid (DNA), and protein sequences) has many applications and uses in many fields (data security, data segmentation, feature extraction, etc.). DNA sequences are used in the cryptography field, using the properties of biomolecules as the carriers of the data. Messenger RNA (mRNA) is a single strand used to make proteins containing genetic information. The information recorded from DNA also carries messages from DNA to ribosomes in the cytosol. In this paper, a new encryption technique bas

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Lagrange Interpolation for Mobile Agent Connection Encryption
...Show More Authors

A new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.

 

View Publication Preview PDF
Publication Date
Thu Sep 29 2022
Journal Name
Al–bahith Al–a'alami
Advertisement content in the Iraqi satellite channels and their commitment to advertisement ethics.
...Show More Authors

The problem of the study is to monitor the content presented in the Iraqi satellite channels to identify the nature of the ideas contained in these ads and to identify the values ​​carried by the creative strategies and ad campaigns that use. Where the satellite is one of the most important technological developments in the field of communications in the nineties and the ads in various forms and functions one of the contents provided by satellite channels where these channels are keen to direct their messages in particular and communication, in general, to address a certain audience and convince and influence in order to achieve certain purposes of the source Or the body from which it originates, especially those that result in an in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 27 2019
Journal Name
Iraqi Journal Of Science
Effect Different Concentrations of Crude Oil on the Pigment Content and Protein Content of Hydrilla Verticillata Plant
...Show More Authors

The current study was conducted to determine the effect of crude oil on the pigments and protein content of Hydrilla verticillata plant from December 2018 to February 2019. Hydrilla verticillata was exposed to different concentrations of treatments (0.01,0.05,0.10,0.20) % of crude oil for 24 days. The pigments content was evaluated as total chlorophyll, a, b, carotene and protein content within plant tissues during the days (1, 8, 16 and 24).

     The results of this study showed an increment in the total chlorophyll values of plant, which is exposed to different concentrations of crude oil compared to the control treatment during the first day of the experiment and decreased compared to cont

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref