Preferred Language
Articles
/
jcofarts-738
Form and content encryption with digital designs in women's contemporary fabrics: زينب عبد علي محسن الزبيدي
...Show More Authors

My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabrics) it reproduces and innovative design language a new form and production of various new ideas by using the designer's imagination and encrypt any encryption in the shapes and contents using computer technology and asking the following:Is it possible to obtain women's contemporary fabric designs effective encryption formats and content of subjects with the possibility of implementation in accordance with digital technology? The objective is to prepare a proposed textile designs contemporary The study identified women's contemporary fabrics designs implemented in digital technology. Chapter II may combine the theoretical framework and the previous studies and the theoretical framework may include the following: Detective Section i: 1. encrypt form and content in the design.Either section II contained digital design in contemporary fabrics.Either section III contained encrypted designs fabrics according to digital technology.Chapter III procedures for research, research methodology and specified and search tool and search forms. Out in chapter IV of the findings, conclusions and recommendations and design proposals, proposals, and one of the most important result of the research:1. built on encryption in the formal sense as in the direction of expressionist canvas.2. the aesthetic values of textile using modern methods in composition design of form design to technical codes diverse modern digital.4. characteristic designs of textile with utilitarian values achieved a large proportion comes from the aesthetic expression and content forms of cryptographic and expressive and symbolic consistency and harmony of forms and colors in sophisticated style with digital technology.5. the count of shapes and design links and content codes codes and units of semantic interpretation was accurate detail to explain the meanings of the forms and content

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Using Quadratic Form Ratio Multiple Test to Estimate Linear Regression Model Parameters in Big Data with Application: Child Labor in Iraq
...Show More Authors

              The current paper proposes a new estimator for the linear regression model parameters under Big Data circumstances.  From the diversity of Big Data variables comes many challenges that  can be interesting to the  researchers who try their best to find new and novel methods to estimate the parameters of linear regression model. Data has been collected by Central Statistical Organization IRAQ, and the child labor in Iraq has been chosen as data. Child labor is the most vital phenomena that both society and education are suffering from and it affects the future of our next generation. Two methods have been selected to estimate the parameter

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 28 2021
Journal Name
2021 1st Babylon International Conference On Information Technology And Science (bicits)
Enhanced Twitter Community Detection using Node Content and Attributes
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
Contemporary Tunisian Ceramics References
...Show More Authors

The reference has occupied a great deal of studies, research and literature, as well as being diverse and comprehensive and has a great dimension of human life, and an indispensable source, as the world is now transforming in an unprecedented manner, under the prominent titles of successive knowledge and technical waves derives its origins and knowledge through the study and the analysis of references in terms of diversity and variations. The current research aims at uncovering the pressing social references that are influential in the formation of contemporary Tunisian ceramics and the recognition of its artistic characteristics.

The theoretical framework included three sections: the first is the concept of the reference, and it

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 30 2023
Journal Name
المجلة العراقية للبحوث الانسانية والاجتماعية والعلمية
Issues of contemporary jurisprudence
...Show More Authors

Islamic jurisprudence is a divine approach capable of confronting all developments that occur in human society and giving appropriate solutions to them. The research discussed opinions related to some contemporary issues according to the rule of no excess or negligence and according to the rules of removing hardship and facilitating in order to reach the appropriate legal ruling for the nature of the situation to which it may be exposed. Man is in paradise, and the research emphasizes the necessity of taking into account the aspect of precaution when deciding on issues, such as the rules of change and the removal of embarrassment

Preview PDF
Publication Date
Fri Jun 23 2023
Journal Name
Al-mustansiriyah Journal Of Science
Image Encryption Using New Non-Linear Stream Cipher Cryptosystem
...Show More Authors

In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.

Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption
...Show More Authors

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

View Publication
Scopus Crossref
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Partial Encryption for Colored Images Based on Face Detection
...Show More Authors

Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach : An Article Review
...Show More Authors

In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Key Generator to Encryption Images Based on Chaotic Maps
...Show More Authors

It is known that images differ from texts in many aspects, such as high repetition and correlation, local structure, capacitance characteristics and frequency. As a result, traditional encryption methods can not be applied to images. In this paper we present a method for designing a simple and efficient messy system using a difference in the output sequence. To meet the requirements of image encryption, we create a new coding system for linear and nonlinear structures based on the generation of a new key based on chaotic maps.

The design uses a kind of chaotic maps including the Chebyshev 1D map, depending on the parameters, for a good random appearance. The output is a test in several measurements, including the complexity of th

... Show More
View Publication Preview PDF