Preferred Language
Articles
/
jcofarts-738
Form and content encryption with digital designs in women's contemporary fabrics: زينب عبد علي محسن الزبيدي
...Show More Authors

My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabrics) it reproduces and innovative design language a new form and production of various new ideas by using the designer's imagination and encrypt any encryption in the shapes and contents using computer technology and asking the following:Is it possible to obtain women's contemporary fabric designs effective encryption formats and content of subjects with the possibility of implementation in accordance with digital technology? The objective is to prepare a proposed textile designs contemporary The study identified women's contemporary fabrics designs implemented in digital technology. Chapter II may combine the theoretical framework and the previous studies and the theoretical framework may include the following: Detective Section i: 1. encrypt form and content in the design.Either section II contained digital design in contemporary fabrics.Either section III contained encrypted designs fabrics according to digital technology.Chapter III procedures for research, research methodology and specified and search tool and search forms. Out in chapter IV of the findings, conclusions and recommendations and design proposals, proposals, and one of the most important result of the research:1. built on encryption in the formal sense as in the direction of expressionist canvas.2. the aesthetic values of textile using modern methods in composition design of form design to technical codes diverse modern digital.4. characteristic designs of textile with utilitarian values achieved a large proportion comes from the aesthetic expression and content forms of cryptographic and expressive and symbolic consistency and harmony of forms and colors in sophisticated style with digital technology.5. the count of shapes and design links and content codes codes and units of semantic interpretation was accurate detail to explain the meanings of the forms and content

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes
...Show More Authors

In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Enhanced RC5 Key Schedule Using One-Dimensional Cellular Automata for Audio File Encryption
...Show More Authors

Audio security is an important aspect in various areas of communication. This paper deals with audio encryption as many of the data communication depends on audio data.  In this paper, a new proposal of audio encryption system has been introduced. The system can be divided into two phases, the first phase focuses on generating a high-quality Pseudo Random Number generator (PRNGs) using elementary, periodic and hybrid rules of cellular automata (CA). The system suggests a new combination of CA rules in an endeavor to provide high randomness and to improve the strength of the proposed cryptosystem. Whereas the second phase produces the Enhanced Rivest Cipher 5 (ERC5) algorithm which employs the generated Random Number Sequence (RNS) i

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
The Utilization of Arabic Calligraphy to Inspire Modern Arabic Type Designs: ربا حسن أبو حسنة
...Show More Authors

Arabic calligraphy is one of the greatest achievements of Islamic art. The visual form of Arabic calligraphy is the primary means of presenting ideas and messages for expressive communication in Arabic typefaces. Emerging computer technology with calligraphy is essential for effective visual designs; however, traditional typefaces are insufficient in number and quality to fulfill the requirements of the current Saudi industry. Thus, this research investigates the processes followed by graphic designers to create modern Arabic type designs inspired by Arabic calligraphy, and presents the characteristics of Arabic calligraphy. The research implemented a mixed experimental and descriptive method, exploring 10 typefaces designed by professio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The significance of the additional verb in Al-shakshakiah sermon of Imam Ali (peace be upon him)
...Show More Authors

The contextual clues researcher guide to determine the meaning of the word is likely to several meanings, was contextual clues Dalili in determining the meanings morphological acts whipped in a sermon Alhqhqih.
And meanings are endless on the contrary language words used to express these meanings, we find that one word may be used to express more than one meaning, leading to the phenomenon of semantic possibility.
So it was inevitable that contain language text on the signs designate the reader and listener and researcher to identify the intended meaning, and these signs are contextual clues in the text.
Actual formulas whipped features from other formulas morphological Pkthertha frequent use and the large number of meanings men

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
The extent to which the content of social and national studies courses is included With interactive thinking maps for the stages of public education in the Kingdom of Saudi Arabia
...Show More Authors

The present study aimed to identify the extent to which the content of social and national studies courses was included in interactive thinking maps in the educational stages in the Kingdom of Saudi Arabia, and to achieve the goal of the study, the researcher used the descriptive and analytical approach, and the study tool used consisted of a content analysis card; Where it included a list of the types of thinking maps, where the study sample consisted of all social and national studies courses at the elementary and intermediate levels, and it is (12) books for the student in its first and second parts, and after verifying the validity and reliability of the tool, it was applied to the study sample, and the study reached conclusions, inc

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
Scenography Features in the Iraqi Contemporary Theatre Show (Macbeth Play, by Salah Al-Qasab- A Model)
...Show More Authors

Societies developed throughout history with the development of life technology, that ideas presented by the contemporary art have been crystallized. The development included all the artistic fields such as the dramatic arts which depend on many effects and elements that led to the completion of the structure of the theater show. Scenography is considered one of the most important elements that the theatre show depends on such as the decoration, lighting, sound effects, costumes and accessories. The research addressed the following question: what are the characteristics and traits of scenography in the theatre show?
The research importance has become clear because it sheds lights on the characteristics of scenography in the Iraqi thea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2010
Journal Name
Iraqi Journal Of Physics
Inelastic magnetic electron scattering M1 form factors in Ca-48 (M3Y fitting parameters consideration)
...Show More Authors

Inelastic magnetic electron scattering M1 at Ex =10.23 MeV form factors in Ca-48 have been investigated. The fp shell model space with four orbits and eight neutrons have been considered and FPD6 has been selected between 32 model space effective interactions to generates the model space vectors for the M1 transition with excitation energy Ex =10.23 MeV and for constructing OBDM. Discarded space (core and higher configuration orbits) has been included through the first order perturbation theory to couple the partice-hole pair of excitation in the calculation of the total M1 form factor and regarding the realistic interaction M3Y as a core polarization interaction with six sets of fitting parameters. Finally the theoretical calculations h

... Show More
View Publication Preview PDF
Publication Date
Mon May 01 2017
Journal Name
مجلة العلوم التربوية والنفسية
تطوير التعليم الجامعي في العراق على وفق الاتجاهات التربوية المعاصرة
...Show More Authors

الملخص - يهدف البحث الحالي الى تعرف اتجاهات مدرسي ومدرسات المدارس الثانوية نحو التربية الجنسية والتعرف على اثر متغير الجنس (ذكور، إناث) في تكوين اتجاهات تدريس التربية الجنسية في التعليم - الثانوي فضلاً عن تعرف التطبيقات التربوية للتربية الجنسية في المدارس الثانوية ، إذ ان التربية الجنسية واحدة من أهم فروع التربية في الإسلام , وهي ذات أهمية في نشر الوعي الديني والصحي والتربوي والاجتماعي والثقافي في المجتمع

... Show More
View Publication
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of Educational And Psychological Researches
تقويم كتابي الفيزياء للمرحلة الإعدادية في ضوء المستحدثات العلمية المعاصرة
...Show More Authors

The present study aimed to measure the calendar estimates for my book Physics of the preparatory phase (fourth and fifth preparatory) has been a research sample consisted of 32 teachers and a school for 36 schools from both sides of the Rusafa and Karkh first To achieve the objectives Find promised researcher tool for measuring the calendar estimates for my book Physics of the preparatory phase in accordance with the contemporary scientific innovations as formed tool from 5 innovations built on the basis of which the paragraphs which formed the final version of the 21 paragraph manual are not substitutes to answer yes -No Your has been used Baha percentages to reach the results may reach current research conclusion which is defic

... Show More
View Publication Preview PDF