Preferred Language
Articles
/
jcofarts-738
Form and content encryption with digital designs in women's contemporary fabrics: زينب عبد علي محسن الزبيدي
...Show More Authors

My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabrics) it reproduces and innovative design language a new form and production of various new ideas by using the designer's imagination and encrypt any encryption in the shapes and contents using computer technology and asking the following:Is it possible to obtain women's contemporary fabric designs effective encryption formats and content of subjects with the possibility of implementation in accordance with digital technology? The objective is to prepare a proposed textile designs contemporary The study identified women's contemporary fabrics designs implemented in digital technology. Chapter II may combine the theoretical framework and the previous studies and the theoretical framework may include the following: Detective Section i: 1. encrypt form and content in the design.Either section II contained digital design in contemporary fabrics.Either section III contained encrypted designs fabrics according to digital technology.Chapter III procedures for research, research methodology and specified and search tool and search forms. Out in chapter IV of the findings, conclusions and recommendations and design proposals, proposals, and one of the most important result of the research:1. built on encryption in the formal sense as in the direction of expressionist canvas.2. the aesthetic values of textile using modern methods in composition design of form design to technical codes diverse modern digital.4. characteristic designs of textile with utilitarian values achieved a large proportion comes from the aesthetic expression and content forms of cryptographic and expressive and symbolic consistency and harmony of forms and colors in sophisticated style with digital technology.5. the count of shapes and design links and content codes codes and units of semantic interpretation was accurate detail to explain the meanings of the forms and content

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 23 2022
Journal Name
Journal Of Craniofacial Surgery
Differences Between Impression Stone Pouring and Digital Pouring in Fully Guided Dental Implant Surgery: A Prospective Clinical Study
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Jul 22 2019
Journal Name
Arab Science Heritage Journal
الوزير علي بن يقطين
...Show More Authors

تعد شخصية الوزير علي بن يقطين من الشخصيات التاريخية البارزة بالرغم من كونه
عمله كوزير ف

View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
College Of Islamic Sciences
شعرية مخاطبات الامام علي
...Show More Authors

To work for your world as if you lived forever and work for your hereafter as if you were dying tomorrow, great wisdom and a high-level literary text and a philosophical text with clear features and complex structure.

This text attributed to Imam Ali is the answer to a question that humanity has  put in place since its existence and to this day, which is: what is the decent and happy life for a dead person?. Myths and religions with different references and philosophers have answered this question in different ways and vision, including Imam Ali, who answered dualism of reason and faith, through his view of the human being and life and clear features.

View Publication Preview PDF
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Improving propagation of Echinacea purpurea and its content of some active compounds by using Tyrosine and Salicylic acid in vitro
...Show More Authors

The seed propagation is the predominant method of Echinacea propagation, which has been criticized for its time-consuming control over the separation factor and the uncertainty of pathogen-free plants produced by this method. The technology of tissue culture has provided multiple opportunities for the production of secondary metabolites continuously without being restricted to a specific season, due to the possibility of controlling the environmental conditions and the components of the nutrient medium needed by the plant. This study was conducted to investigate the effects of salicylic acid as elicitor and tyrosine as precursor on propagation and some secondary compounds production in coneflower in vitro. The result showed the superiori

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jan 14 2020
Journal Name
College Of Islamic Sciences
The Origin of Creation in Khattab (The Beginning of Creation) by Imam Ali (as) and Genesis (Comparative Study)
...Show More Authors

The research aims to answer the questions that revolve in the mind of mankind about how to create creation, how it existed prior to creation, who created existence, and the characteristics of that presence. The researcher also wanted to show that the culture of Imam Ali (peace be upon him) In the book of Adam, peace be upon him, God has punished Adam (peace be upon him) for not having sinned. Because his wife is the one who fed him the fruit of the tree, and this is contrary to what was stated in the sermon of Imam (peace be upon him) who Z Adam (peace be upon him) is the one who trusted Satan and Gwighth.We note that the approach of the rhetoric has pointed to the creation of angels and did not refer to the creation of Eve and the class

... Show More
View Publication
Publication Date
Tue Mar 31 2020
Journal Name
College Of Islamic Sciences
The Origin of Creation in Khattab (The Beginning of Creation) by Imam Ali (as) and Genesis (Comparative Study)
...Show More Authors

The research aims to answer the questions that revolve in the mind of mankind about how to create creation, how it existed prior to creation, who created existence, and the characteristics of that presence. The researcher also wanted to show that the culture of Imam Ali (peace be upon him) In the book of Adam, peace be upon him, God has punished Adam (peace be upon him) for not having sinned. Because his wife is the one who fed him the fruit of the tree, and this is contrary to what was stated in the sermon of Imam (peace be upon him) who Z Adam (peace be upon him) is the one who trusted Satan and Gwighth.

We note that the approach of the rhetoric has pointed to the creation of angels and did not refer to

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Impact germination in the content of the chemical components of Homs and sensory qualities of Biskt plant it,
...Show More Authors

This study was conducted to identify the impact of germination in the ratio Almaah of Chemical Constituents of Homs and in the organoleptic properties of the Biskt plant it and compare the results with the treatment control (seeds Almnepth) Adhrt results for a significant increase in the percentage of crude protein with the progress of the process of germination, reaching 24.5% in percentage of crude protein with the progress of the germination process Krbu hydrate college during the germination period, reaching 59.2% in the fourth day

View Publication Preview PDF
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Formulation of Azithromycin Suspension as an Oral Dosage Form
...Show More Authors

Azithromycin is the drug of choice in the treatment of several bacterial infections, most often those causing middle ear infection, bronchitis, pneumonia, typhoid and sinusitis. It’s also effective against certain urinary tract infections and venereal diseases. This study was carried out to prepare an acceptable suspension either as dry physical mixture powder or granules to be reconstituted, through studying the effect of various type and concentration of suspending agent (xanthan gum, hydroxypropyl methylcellulose (HPMC), either alone or in combination) on the release profile of the drug. The best prepared suspension formulas (H& III) were selected depending on the dissolution profile of each formulas and then compared with

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 13 2019
Journal Name
Iraqi Journal Of Physics
Inelastic longitudinal electron scattering C42 form factors in42Ti nucleus
...Show More Authors

Inelastic longitudinal electron scattering form factors for second
excited state C42 in 42Ti nucleus have been calculated using shell
model theory. Fp shell model space with configuration (1f7/2 2p3/2
1f5/2 2p1/2) has been adopted in order to distribute the valence
particles (protons and neutrons) outside an inert core 40Ca. Modern
model space effective interactions like FPD6 and GXPF1 have been
used to generate model space vectors and harmonic oscillator wave
function as a single particle wave function. Discarder space (core
orbits + higher orbits) has been included in (core polarization effect)
as a first order correction in microscopic theory to measure the
interested multipole form factors via the model

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More