Summary: | 碩士 === 國立臺南藝術大學 === 建築藝術研究所 === 98 === In reviewing the history of development of architecture, we could find that after the basic installation demands from architecture were satisfied, it would turn to decorative vocabulary symbolizing times and develop various forms and styles of architecture. However, the evolution of architecture is based on the breakthrough of predecessors’ thinking that it is important to construct a set of rules for changing existed forms and style of architecture. The changes could not only enhance spatial interest as well as evolve the styles of architecture to continue the styles of architecture but also realize the co-existence and the compromise of the styles in different regions and integrate them into environments.
Given that the encryption theory in cryptography is also based on the manipulation of human visual inertia and the contravention of general cognition to encrypt that will diversity the cipher text, the encryption theory has effects of form reforms. So the extraction of encryption model may act as a reference to help the architecture in the development of building form of “Camouflaged Style” to create a new vision.
Therefore, the research analyzed the encryption model of cryptography and combined with the types of operating elements of “encryption clear-text” and “architecture style” and parallel and analogue construction of formation model that would act as the base of follow-up operation methods. In the meantime, through the reorganization of the theories including the “Syntactic theory” of architecture in the principles of visual illusion, art systems and post-modern architecture, and verification and confirmation by a lot of cases, the research formed a set of encryption rules in the operation systems of the formation model of spatial element of “deformation” and the constitutive model of spatial organization of “sequence change” that would establish the procedure system of encryption of spatial “style” of architecture. The system would be realized and applied to the spatial operation to create the possibility of encryption of style and formation.
|