Preferred Language
Articles
/
jcofarts-738
Form and content encryption with digital designs in women's contemporary fabrics: زينب عبد علي محسن الزبيدي
...Show More Authors

My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabrics) it reproduces and innovative design language a new form and production of various new ideas by using the designer's imagination and encrypt any encryption in the shapes and contents using computer technology and asking the following:Is it possible to obtain women's contemporary fabric designs effective encryption formats and content of subjects with the possibility of implementation in accordance with digital technology? The objective is to prepare a proposed textile designs contemporary The study identified women's contemporary fabrics designs implemented in digital technology. Chapter II may combine the theoretical framework and the previous studies and the theoretical framework may include the following: Detective Section i: 1. encrypt form and content in the design.Either section II contained digital design in contemporary fabrics.Either section III contained encrypted designs fabrics according to digital technology.Chapter III procedures for research, research methodology and specified and search tool and search forms. Out in chapter IV of the findings, conclusions and recommendations and design proposals, proposals, and one of the most important result of the research:1. built on encryption in the formal sense as in the direction of expressionist canvas.2. the aesthetic values of textile using modern methods in composition design of form design to technical codes diverse modern digital.4. characteristic designs of textile with utilitarian values achieved a large proportion comes from the aesthetic expression and content forms of cryptographic and expressive and symbolic consistency and harmony of forms and colors in sophisticated style with digital technology.5. the count of shapes and design links and content codes codes and units of semantic interpretation was accurate detail to explain the meanings of the forms and content

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of digital finance in improving and enhancing financial inclusion: An applied research in the Iraqi banking system
...Show More Authors

The research seeks to highlight the importance of digital finance in banking by providing financial and banking services and its role in improving the access of financial services to customers at the farthest possible point by using modern technology to finance their needs by granting them cash credits through electronic payment tools to facilitate them and shorten time and effort as well as Low cost, and this cannot be achieved without concerted efforts and the provision of basic infrastructure that includes connecting the Internet to all targeted areas, whether cities or rural areas, as well as distributing the largest possible number of ATMs and sending specialized teams to those areas that develop in customers the culture of digital

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Puppets theater importance in contemporary society: حسين خميس علوان الأنصاري
...Show More Authors

Puppets theaters importance in contemporary society Throughout history puppets theater recognized to achieve constant successes, despite other expressive arts competitors, through diversity of forms topics and ways of direction whether for adults or children’s audients. Today every society has its own puppets, of which the forms are inspired by the cultural heritage. to express its cultural identity.

      Each of those puppets is c by its powerful expression, going beyond the performance of human actors. Thanks to technology, puppets industry, production and direction has evolved in this study, we will identify puppets theatre, its types importance in modern society, and secret of its powerful expressi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 31 2025
Journal Name
Computers, Materials & Continua
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
...Show More Authors

The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Research In Science And Technology
Encryption of Medical Image Based on Cascaded Design of AES Block Algorithm and Chaotic Map
...Show More Authors

Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad

... Show More
View Publication
Crossref
Publication Date
Mon May 27 2019
Journal Name
Al-academy
Globalization and its Transformations in Contemporary ceramics (European and American Porcelain a Model): أسعد مطر خليل
...Show More Authors

Globalization has occupied a great deal of studies, research and literature, in addition to being a phenomenon that has imposed itself firmly on the ground. Globalization is considered the main feature of the current moment in today's world. The world is now transforming in an unprecedented way under noticeable titles of successive waves of knowledge and technology.The current research aims to identify the effects of globalization on the variables and their political, social, media and cultural dimensions, as well as culture of consumption and cultural identity.The theoretical framework included two sections: the first is the concept of globalization, its history and its dimensions, and the second is the modernity in contemporary Europea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Al-Rawandi and His Book “Rahat Il-Sudoor and Ayat Il-Suroor” A historical Study in Content and Style
...Show More Authors

The Rwandan author of comfort chests and verse pleasure of the most important historians of the Seljuks in the sixth century AH / twelfth century and belongs to the mostly ethnic scientists family has won favor with the Sultans of the Seljuks until he became the most famous Markhém is his main source of research sources with respect to the political and social history the Seljuks and the relationship of the Seljuk sultans of the Abbasid caliphs in Baghdad.
The book included the history of the Seljuks from the time of statehood in the fifth century AH / atheist century AD until the death of the Sultan Tgrl bin Arslan year 590 AH / 1193 AD and then shed Akhawarzmeyen, and touched the author at the end of the book in separate chapters t

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Nurses’ Knowledge Regarding Oxytocin Administration during Labor at Maternity Hospitals in Al-Kut City
...Show More Authors

Objectives of the study: To assess nurses knowledge regarding oxytocin administration during labor and
delivery in maternity hospitals, and to find out the relationship between nurses knowledge and studied
variables (age, level of education, work times (shift) experience year, training course in nursing field).
Methodology: Descriptive analytic study was conducted on non-probability sample (convenient) of (70) nurses
to assess nurse’s knowledge related to oxytocin administration. The study is conducted at Al- kut Hospital for
Gynecology Obstetrics and Pediatrics and Al- Zahraa Teaching Hospital during periods 5th February to 24th
April 2013, A questionnaire was used as a tool of data collection to fulfill with objecti

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A proposed encryption technique of different texts using circular link lists
...Show More Authors

View Publication
Scopus (5)
Scopus Crossref
Publication Date
Thu Feb 15 2024
Journal Name
Journal Of Theoretical And Applied Information Technology
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec

... Show More
View Publication
Scopus (1)
Scopus
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Severity Based Light-Weight Encryption Model for Secure Medical Information System
...Show More Authors

View Publication
Scopus (20)
Crossref (35)
Scopus Clarivate Crossref