The graphic privacy feature is one of the most important specifications for the existence of any type of design achievements alike, which is one of the graphic products with its multiple data, and from here the current research investigates the graphic privacy of vector graphics design with all its technical descriptions and concepts associated with it and the possibility of achieving it to the best that it should be from Where its formal structure in children's publications, where the structural structure of the current research came from the first chapter, which contained the research problem, which came according to the following question: What is the graphic privacy in the design of vector graphics in children's publications? It also determined the importance of research in the theoretical and applied aspects. The goal of the research was determined to reveal graphic privacy in the design of vector graphics. It also identified three limits for research regarding the subject, time and place, as well as defining the terms of privacy and graphic privacy and vector graphics. The second chapter also included the theoretical framework related to the knowledge of the subject of the research, and the theoretical framework included analysis and criticism of models of children's publications, then the research came out with results from them. The dominant unit appeared in computer vector graphics through vector graphic processors, and thus excitement and strangeness were achieved. The research also came out with recommendations for the current study. Then the research was included in the list of Arab and foreign sources related to the research
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThe purpose of this project is to build a scientific base and computational programs in an accelerator design work. The transfer of group of laws in alinear accelerator cavity to computer codes written in Fortran power station language is inorder to get a numerical calculation of an electromagnetic field generated in the cavities of the linear accelerator. The program in put contains mainly the following, the geometrical cavity constant, and the triangular finite element method high – order polynomial. The out put contains vertical and horizontal components of the electrical field together with the electrical and the magnetic field intensity.
The operation and management of water resources projects have direct and significant effects on the optimum use of water. Artificial intelligence techniques are a new tool used to help in making optimized decisions, based on knowledge bases in the planning, implementation, operation and management of projects as well as controlling flowing water quantities to prevent flooding and storage of excess water and use it during drought.
In this research, an Expert System was designed for operating and managing the system of AthTharthar Lake (ESSTAR). It was applied for all expected conditions of flow, including the cases of drought, normal flow, and during floods. Moreover, the cases of hypothetical op
... Show MoreThis paper describes theoretical modeling of electrostatic mirror based on two cylindrical electrodes, A computational investigation has been carried out on the design and properties of the electrostatic mirror. we suggest a mathematical expression to represent the axial potential of an electrostatic mirror. The beam path by using the Bimurzaev technique have been investigated as a mirror trajectory with the aid of Runge – Kutta method. the electrode shape of mirror two electrode has been determined by using package SIMION computer program . The spherical and chromatic aberrations coefficients of mirror has been computed and normalized in terms of the focal length. The choice of the mirror depends on the op
... Show MoreThe quality and cost of constructed buildings are heavily influenced by the performance of design/auditing consultants. Thus, selecting the right design consultant and design auditing consultants is of utmost importance and not an easy task for any construction client. so, the client should specify the efficiency criteria and assess the performance levels of the design and design auditing consultant firm. The study aims to identify the selection criteria of the design consultant in construction projects and also identify the selection criteria of the design auditing consultant for the construction projects by using the Delphi survey with applying the principal components analysis (PCA
Each era has advantages in terms of innovation and development in form, technology, style, and design in ceramic vessels, both at the level of functional and aesthetic performance, so this study aimed to demonstrate the importance of geometrical foundations in the design structure of contemporary ceramic vessels, and also to reveal the constructive skills in The structure of the ceramic figure.
The researchers used the descriptive analytical approach to suit the nature of the study, and they described and analyzed the ceramic works in terms of geometric shape systems, elements and foundations of design in construction, formal diversity in the general design of ceramic vessels, and references and sources of artwork. In addition to th
The importance of the Arabic language and its deep vocabulary in the live translation of the work of science and interior design can't be hidden from the whole world. The previous studies have dealt with the role of the linguistic vocabulary and Arabic calligraphy in interior spaces in terms of decoration and design. However, this research sheds light on the importance of linguistic vocabulary in the construction of design thought and how it has become the a basic motivation in the process of scientific and practical construction and not just aesthetic formations that took their place in the interior spaces, as linguistic vocabulary emerged recently and echoed within the specialization of interior design and formed a key motive to explor
... Show MoreSolar activity monitoring is important in our life because of its direct or indirect influence on our life, not only on ionospheric communications. To study solar activity, researchers need measuring and monitoring instruments, these instruments are mostly expensive and are not available in all universities. In this paper, a very low frequency radio receiver had been designed and implemented with components available in most markets to support the researchers, college students, and radio astronomy amateurs with a minimum input voltage less than 100µV, an output voltage less than 135 m V with no distortion and an overall gain of 34dB. A comparison had been done between two circuit structures using a workbench software program and experim
... Show Morethe political changeable is important reflection in areas of life and the designers tried to high light it in the cover of Journal promised time Journal a fertile square to show reflection of political changeable, and triad to search the current path. The first chapter organized according to axes, problem of research formulated according to question:- what are reflections of political changeable in magazine cover?
The importance of research depth of specialized approach on level of technical and stylistic as ago al ago as in: the baring of political changeable in design of journal's cover. The research moves in cognitive border from 2013 to 2017 and selection of t
... Show More