Preferred Language
Articles
/
jcofarts-738
Form and content encryption with digital designs in women's contemporary fabrics: زينب عبد علي محسن الزبيدي
...Show More Authors

My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabrics) it reproduces and innovative design language a new form and production of various new ideas by using the designer's imagination and encrypt any encryption in the shapes and contents using computer technology and asking the following:Is it possible to obtain women's contemporary fabric designs effective encryption formats and content of subjects with the possibility of implementation in accordance with digital technology? The objective is to prepare a proposed textile designs contemporary The study identified women's contemporary fabrics designs implemented in digital technology. Chapter II may combine the theoretical framework and the previous studies and the theoretical framework may include the following: Detective Section i: 1. encrypt form and content in the design.Either section II contained digital design in contemporary fabrics.Either section III contained encrypted designs fabrics according to digital technology.Chapter III procedures for research, research methodology and specified and search tool and search forms. Out in chapter IV of the findings, conclusions and recommendations and design proposals, proposals, and one of the most important result of the research:1. built on encryption in the formal sense as in the direction of expressionist canvas.2. the aesthetic values of textile using modern methods in composition design of form design to technical codes diverse modern digital.4. characteristic designs of textile with utilitarian values achieved a large proportion comes from the aesthetic expression and content forms of cryptographic and expressive and symbolic consistency and harmony of forms and colors in sophisticated style with digital technology.5. the count of shapes and design links and content codes codes and units of semantic interpretation was accurate detail to explain the meanings of the forms and content

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Aesthetic references for reductive forms in contemporary Iraqi sculpture
...Show More Authors

Reduction has been linked visually in art since man began making functional and aesthetic forms, and this beginning can be identified with cave paintings. Reduction is one of the clearest indications of intellectual presence in aesthetic experience. Modernism was greatly supported by the great transformations that the intellectual movement witnessed in the world in general and in Europe in particular. There, and their transfer of European artistic experiences, and the reflection of this influence in their aesthetic sculptures, and for this reason the researchers find that the study of the aesthetic references of the reductive forms in the Iraqi sculptural experience represents a great importance in the study of the history of contemporar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Political Sciences Journal
Problematic discourse of modernity in contemporary political Islamic thought
...Show More Authors

اشكالية خطاب الحداثة في الفكر السياسي الاسلامي المعاصر

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Shift towards Digital Education According to Vision 2030 in Light of Some Variables from the Perspective of Workers with Disabilities
...Show More Authors

The current study aimed to measure the attitudes of female teachers towards the use of digital learning and the degree of possessing their digital education skills. The study sample consisted of (180) workers with disabilities (mental disability، auditory impairment، visual disability، hyperactivity and distraction. To achieve the goals of the study, the transformation measure was used towards digital education for people with disabilities. The study reached the following results: the availability of digital learning skills among workers with disabilities. The study concluded with a series of recommendations including holding Training courses to keep up with the challenges of educational trends and modern technology in this area.

View Publication Preview PDF
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Consistency and Consistency in Contemporary Iraqi Painting - Selected Models-: حسين شاكر قاسم العيداني
...Show More Authors

  The tagged research is concerned with observation and investigating the concepts of consistency and harmony in contemporary Iraqi painting (selected models) in order to reveal the mechanisms and rules of these two concepts in the artistic field and their mechanisms of operation. How reflected tools Consistency and harmony in contemporary Iraqi painting? What is consistency and what are its mechanisms and principles? Is consistency a unit product quality? Are there similarities between consistency and harmony? What is harmony and its principles and rules? As for the second chapter, it included two topics that dealt with the first topic - consistency and harmony between concept and significance, while the second topic meant - histor

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Historical Origins of Internal Space Designs of Educational Schools in Iraq: حسنين صباح داوّد سلمان
...Show More Authors

Studying the past for its importance and connection with the present is reflected in a relative scale in the light of data and thought of the predecessors of a great nation like the Mesopotamia, where its civilization flourished and rose since the ancient times, which inspires the present with inherited meanings that might be an entity or recognized symbols in the establishment of a vision, system or architectural building. The researcher has crystallized the description of the past to enhance the vision of the present within what is required by the interior design specialty about the historical origins of education and the design of schools in the Mesopotamia, in addition to its ethnic and environmental specificity and the moral content

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael

... Show More
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 21 2020
Journal Name
Baghdad Science Journal
Spectrophotometer Determination of Cefixime in pure form and pharmaceutical preparation by Using Cloud point Extraction
...Show More Authors

Two simple methods spectrophotometric were suggested for the determination of Cefixime (CFX) in pure form and pharmaceutical preparation. The first method is based without cloud point (CPE) on diazotization of the Cefixime drug by sodium nitrite at 5Cº followed by coupling with ortho nitro phenol in basic medium to form orange colour. The product was stabilized and measured 400 nm. Beer’s law was obeyed in the concentration range of (10-160) μg∙mL-1 Sandell’s sensitivity was 0.0888μg∙cm-1, the detection limit was 0.07896μg∙mL-1, and the limit of Quantitation was 0.085389μg∙mL-1.The second method was cloud point extraction (CPE) with using  Trtion X-114 as surfactant. Beer

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref