Preferred Language
Articles
/
jcofarts-738
Form and content encryption with digital designs in women's contemporary fabrics: زينب عبد علي محسن الزبيدي
...Show More Authors

My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabrics) it reproduces and innovative design language a new form and production of various new ideas by using the designer's imagination and encrypt any encryption in the shapes and contents using computer technology and asking the following:Is it possible to obtain women's contemporary fabric designs effective encryption formats and content of subjects with the possibility of implementation in accordance with digital technology? The objective is to prepare a proposed textile designs contemporary The study identified women's contemporary fabrics designs implemented in digital technology. Chapter II may combine the theoretical framework and the previous studies and the theoretical framework may include the following: Detective Section i: 1. encrypt form and content in the design.Either section II contained digital design in contemporary fabrics.Either section III contained encrypted designs fabrics according to digital technology.Chapter III procedures for research, research methodology and specified and search tool and search forms. Out in chapter IV of the findings, conclusions and recommendations and design proposals, proposals, and one of the most important result of the research:1. built on encryption in the formal sense as in the direction of expressionist canvas.2. the aesthetic values of textile using modern methods in composition design of form design to technical codes diverse modern digital.4. characteristic designs of textile with utilitarian values achieved a large proportion comes from the aesthetic expression and content forms of cryptographic and expressive and symbolic consistency and harmony of forms and colors in sophisticated style with digital technology.5. the count of shapes and design links and content codes codes and units of semantic interpretation was accurate detail to explain the meanings of the forms and content

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael

... Show More
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 11 2017
Journal Name
Al-academy
Overlap Between Contemporary Art Contexts And Quotation Intertextuality
...Show More Authors

Despite the artistic importance that Assumption intertextuality in technical studies, it is indispensable for the artist and writer whatever, Intertextuality s is not a coincidence, is not correct to be so, so that human culture is governed by Trait obstetrics and conclusion shows and the longer the life of culture, whatever it be more fortunate the correlation between the present and the past. From this point the problem of current research was founded in the detection of overlapping contexts in contemporary art between intertextuality and quotation, and concluded by identifying the most important terms in the search, while the second chapter highlighted the intertextuality in contemporary artistic discourse and the types of intertextua

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 08 2024
Journal Name
Al-academy
Medea Euripides between text and contemporary theatrical presentation
...Show More Authors

It is not available for us to go back in time and see plays old and it plays giants tragedy ancient Greek (Aeschylus, Sofokls, and yourbedes) through the eyes of a generation ago, and if we were able to go back to Ntegathm play it is certain that we will not taste or Nstassig for much of what we see from these offers will not afford the traditional religious rituals, which was accompanied also dance and music in the style of ancient Greek play was representing a large part of the theater see manifestations Can our eyes and ears we twentieth century audience to accept those appearances, and it was then?
Inevitably it will look like a museum bycollection not only. So we find ourselves in the light of the foregoing forced When you do rem

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Second International Conference On Innovations In Software Architecture And Computational Systems (isacs 2022)
Structural flexibility and its impact on contemporary architecture
...Show More Authors

. The concepts of structural flexibility became one of the important goals in the design phases to reach high performance in architecture. The pioneering projects and ideas that linked architecture with technologies and scientific innovations appeared, with the aim of reaching projects that mix the concepts of flexibility with the development of machine thought and modern technology to meet the functional, environmental, and aesthetic requirements for human wellbeing. The aim of this paper is to identify the mechanisms used in order to reach flexible structural systems capable of accommodating technological changes and developments. The research hypothesizes that the structural design according to the concepts of flexibility achieves high s

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Retreat and the science of speech Contemporary reading
...Show More Authors

However, the effects of these ideas are still evident
Think of those who follow the footsteps of Muslim scholars and thinkers.
Intellectual source of Gnostic Gnar
And in dealing with issues of Islamic thought
Annalisa intersecting trends of thought, Minya who melts in Masarya and supported him and believes in Bo and extremist Vue,
 Lea, trying to throw it with a few times, looks at Elya look
There are those who stand in the opposite position
There are those who stand in a selective compromise, but this school of thought remains
 G - the features of Islamic thought that believes in the mind and Imoto in the defense of
An intellectual station and generalized bar
Creed. In his study, the researcher wi

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Validity of Digital and Rapid Prototyped Orthodontic Study Models
...Show More Authors

Background: The integration of modern computer-aided design and manufacturing technologies in diagnosis, treatment planning, and appliance construction is changing the way in which orthodontic treatment is provided to patients. The aim of this study is to assess the validity of digital and rapid prototyped orthodontic study models as compared to their original stone models. Materials and methods: The sample of the study consisted of 30 study models with well-aligned, Angle Class I malocclusion. The models were digitized with desktop scanner to create digital models. Digital files were then converted to plastic physical casts using prototyping machine, which utilizes the fused deposition modeling technology. Polylactic acid polymer was chose

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Image encryption based on combined between linear feedback shift registers and 3D chaotic maps
...Show More Authors

Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref