Preferred Language
Articles
/
jcofarts-738
Form and content encryption with digital designs in women's contemporary fabrics: زينب عبد علي محسن الزبيدي
...Show More Authors

My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabrics) it reproduces and innovative design language a new form and production of various new ideas by using the designer's imagination and encrypt any encryption in the shapes and contents using computer technology and asking the following:Is it possible to obtain women's contemporary fabric designs effective encryption formats and content of subjects with the possibility of implementation in accordance with digital technology? The objective is to prepare a proposed textile designs contemporary The study identified women's contemporary fabrics designs implemented in digital technology. Chapter II may combine the theoretical framework and the previous studies and the theoretical framework may include the following: Detective Section i: 1. encrypt form and content in the design.Either section II contained digital design in contemporary fabrics.Either section III contained encrypted designs fabrics according to digital technology.Chapter III procedures for research, research methodology and specified and search tool and search forms. Out in chapter IV of the findings, conclusions and recommendations and design proposals, proposals, and one of the most important result of the research:1. built on encryption in the formal sense as in the direction of expressionist canvas.2. the aesthetic values of textile using modern methods in composition design of form design to technical codes diverse modern digital.4. characteristic designs of textile with utilitarian values achieved a large proportion comes from the aesthetic expression and content forms of cryptographic and expressive and symbolic consistency and harmony of forms and colors in sophisticated style with digital technology.5. the count of shapes and design links and content codes codes and units of semantic interpretation was accurate detail to explain the meanings of the forms and content

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
The Relationship Between Using Diverse Materials to the Intellectual Context's in the Art of Contemporary Ceramic
...Show More Authors

The use of different materials in the art of ceramics is considered a new form of contemporary philosophical trends. That was introduced to art as a result of societal changes and transformations and rapid technological development. And it plays a very essential part in the beauty of the artistic structure. The contrast of using different materials in ceramics is considered a part of the old historical achievements since the art of ceramics used to follow strict standards. Which does not apply to contemporary ceramic, Because recently, it has become free from any religious and social control and created a whole new intellectual context, heading to new horizons in which it works with the newly added materials as a strategy to ensure the a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 28 2018
Journal Name
Arab Science Heritage Journal
الفقهية الفقيهة البغدادية ست الملوك فاطمه بنت علي بن علي (ت710/1310)
...Show More Authors

Did not The Baghdadi community in the seventh century thirteenth century AD was the appearance of a great scientists who have an important role in the intellectual movement at Baghdad in that period, despite the political corruption. Sit Al-melook Baghdadi is one of notables seventh century thirteen century AD who lived its events and interacted with these event, In spite of the lack of information in the historical sources wrote about what wrote about her refers to the assumption of a reputability place among scholars of its age.

View Publication Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Multidimensional Systolic Arrays of LMS Algorithm Adaptive (FIR) Digital Filters
...Show More Authors

A multidimensional systolic arrays realization of LMS algorithm by a method of mapping regular algorithm onto processor array, are designed. They are based on appropriately selected 1-D systolic array filter that depends on the inner product sum systolic implementation. Various arrays may be derived that exhibit a regular arrangement of the cells (processors) and local interconnection pattern, which are important for VLSI implementation. It reduces latency time and increases the throughput rate in comparison to classical 1-D systolic arrays. The 3-D multilayered array consists of 2-D layers, which are connected with each other only by edges. Such arrays for LMS-based adaptive (FIR) filter may be opposed the fundamental requirements of fa

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Apr 16 2025
Journal Name
International Journal Of Engineering Pedagogy (ijep)
Utilizing Machine Learning Techniques to Predict University Students' Digital Competence
...Show More Authors

Given the importance of possessing the digital competence (DC) required by the technological age, whether for teachers or students and even communities and governments, educational institutions in most countries have sought to benefit from modern technologies brought about by the technological revolution in developing learning and teaching and using modern technologies in providing educational services to learners. Since university students will have the doors to work opened in all fields, the research aims to know their level of DC in artificial intelligence (AI) applications and systems utilizing machine learning (ML) techniques. The descriptive approach was used, as the research community consisted of students from the University

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Wed Jun 30 2021
Journal Name
College Of Islamic Sciences
شعرية مخاطبات الامام علي
...Show More Authors

To work for your world as if you lived forever and work for your hereafter as if you were dying tomorrow, great wisdom and a high-level literary text and a philosophical text with clear features and complex structure.

This text attributed to Imam Ali is the answer to a question that humanity has  put in place since its existence and to this day, which is: what is the decent and happy life for a dead person?. Myths and religions with different references and philosophers have answered this question in different ways and vision, including Imam Ali, who answered dualism of reason and faith, through his view of the human being and life and clear features.

View Publication Preview PDF
Publication Date
Mon Jul 22 2019
Journal Name
Arab Science Heritage Journal
الوزير علي بن يقطين
...Show More Authors

تعد شخصية الوزير علي بن يقطين من الشخصيات التاريخية البارزة بالرغم من كونه
عمله كوزير ف

View Publication Preview PDF
Publication Date
Mon Jul 04 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of agricultural insurance in the prevention of financing risks in the form of slam : "An Empirical Study on Shikan Insurance and Reinsurance Company
...Show More Authors

The aim of this research is to introduce agricultural insurance, to define financing in the form of salam and the role of agricultural insurance in the prevention of risks to agricultural finance operations in the form of salam by verifying the hypotheses through which to reach the results, including the imposition of risks for agricultural finance in the form of salam, The study of agricultural finance in the form of salm, the deductive approach to the development of the problem of research and hypotheses, and the inductive method to extrapolate the results through analysis and brother The researcher concluded that agricultural insurance works to bridge the risks facing agricultural finance in the form of the ladder in cases of

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 25 2022
Journal Name
Al-mağallaẗ Al-šāmilaẗ Li-l-ḥuqūq
The Intent to Harm Others as a Form of Abuse of Rights – A Study in Light of U.S. Law
...Show More Authors

In a world of limited space, the owners are always surrounded by others next to them, and, consequently, there is hardly any activity which the owner may exercise on his land which would not affect the other owners. If he builds a building, that building may block the sun's rays or the air from the buildings next to it and owned by other people. And if he runs a business, the lands adjacent to that business may be overburdened with the accompanying noise or traffic. If oil is prospected in a land, the neighboring lands may be deprived of oil or their owners may be exposed to toxic fumes. Hence the importance of researching the intention of harming others, as it is one of the most important forms of abuse in the use of the right (especially

... Show More
View Publication
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The significance of the additional verb in Al-shakshakiah sermon of Imam Ali (peace be upon him)
...Show More Authors

The contextual clues researcher guide to determine the meaning of the word is likely to several meanings, was contextual clues Dalili in determining the meanings morphological acts whipped in a sermon Alhqhqih.
And meanings are endless on the contrary language words used to express these meanings, we find that one word may be used to express more than one meaning, leading to the phenomenon of semantic possibility.
So it was inevitable that contain language text on the signs designate the reader and listener and researcher to identify the intended meaning, and these signs are contextual clues in the text.
Actual formulas whipped features from other formulas morphological Pkthertha frequent use and the large number of meanings men

... Show More
View Publication Preview PDF