The Type of Camouflaged Style in Spatial Research - Focused on the Cryptography

碩士 === 國立臺南藝術大學 === 建築藝術研究所 === 98 === In reviewing the history of development of architecture, we could find that after the basic installation demands from architecture were satisfied, it would turn to decorative vocabulary symbolizing times and develop various forms and styles of architecture....

Full description

Bibliographic Details
Main Authors: Hsu, Hsiao- Pin, 許筱萍
Other Authors: Chiang, Kuan-Hsun
Format: Others
Language:zh-TW
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/10723723534685664576
id ndltd-TW-098TNCA5639017
record_format oai_dc
spelling ndltd-TW-098TNCA56390172015-10-13T18:25:51Z http://ndltd.ncl.edu.tw/handle/10723723534685664576 The Type of Camouflaged Style in Spatial Research - Focused on the Cryptography 建築「隱風格」之類型研究-以密碼學加密模式為例 Hsu, Hsiao- Pin 許筱萍 碩士 國立臺南藝術大學 建築藝術研究所 98 In reviewing the history of development of architecture, we could find that after the basic installation demands from architecture were satisfied, it would turn to decorative vocabulary symbolizing times and develop various forms and styles of architecture. However, the evolution of architecture is based on the breakthrough of predecessors’ thinking that it is important to construct a set of rules for changing existed forms and style of architecture. The changes could not only enhance spatial interest as well as evolve the styles of architecture to continue the styles of architecture but also realize the co-existence and the compromise of the styles in different regions and integrate them into environments. Given that the encryption theory in cryptography is also based on the manipulation of human visual inertia and the contravention of general cognition to encrypt that will diversity the cipher text, the encryption theory has effects of form reforms. So the extraction of encryption model may act as a reference to help the architecture in the development of building form of “Camouflaged Style” to create a new vision. Therefore, the research analyzed the encryption model of cryptography and combined with the types of operating elements of “encryption clear-text” and “architecture style” and parallel and analogue construction of formation model that would act as the base of follow-up operation methods. In the meantime, through the reorganization of the theories including the “Syntactic theory” of architecture in the principles of visual illusion, art systems and post-modern architecture, and verification and confirmation by a lot of cases, the research formed a set of encryption rules in the operation systems of the formation model of spatial element of “deformation” and the constitutive model of spatial organization of “sequence change” that would establish the procedure system of encryption of spatial “style” of architecture. The system would be realized and applied to the spatial operation to create the possibility of encryption of style and formation. Chiang, Kuan-Hsun Wang, Wei-ho 江冠勳 王為河 2009 學位論文 ; thesis 130 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺南藝術大學 === 建築藝術研究所 === 98 === In reviewing the history of development of architecture, we could find that after the basic installation demands from architecture were satisfied, it would turn to decorative vocabulary symbolizing times and develop various forms and styles of architecture. However, the evolution of architecture is based on the breakthrough of predecessors’ thinking that it is important to construct a set of rules for changing existed forms and style of architecture. The changes could not only enhance spatial interest as well as evolve the styles of architecture to continue the styles of architecture but also realize the co-existence and the compromise of the styles in different regions and integrate them into environments. Given that the encryption theory in cryptography is also based on the manipulation of human visual inertia and the contravention of general cognition to encrypt that will diversity the cipher text, the encryption theory has effects of form reforms. So the extraction of encryption model may act as a reference to help the architecture in the development of building form of “Camouflaged Style” to create a new vision. Therefore, the research analyzed the encryption model of cryptography and combined with the types of operating elements of “encryption clear-text” and “architecture style” and parallel and analogue construction of formation model that would act as the base of follow-up operation methods. In the meantime, through the reorganization of the theories including the “Syntactic theory” of architecture in the principles of visual illusion, art systems and post-modern architecture, and verification and confirmation by a lot of cases, the research formed a set of encryption rules in the operation systems of the formation model of spatial element of “deformation” and the constitutive model of spatial organization of “sequence change” that would establish the procedure system of encryption of spatial “style” of architecture. The system would be realized and applied to the spatial operation to create the possibility of encryption of style and formation.
author2 Chiang, Kuan-Hsun
author_facet Chiang, Kuan-Hsun
Hsu, Hsiao- Pin
許筱萍
author Hsu, Hsiao- Pin
許筱萍
spellingShingle Hsu, Hsiao- Pin
許筱萍
The Type of Camouflaged Style in Spatial Research - Focused on the Cryptography
author_sort Hsu, Hsiao- Pin
title The Type of Camouflaged Style in Spatial Research - Focused on the Cryptography
title_short The Type of Camouflaged Style in Spatial Research - Focused on the Cryptography
title_full The Type of Camouflaged Style in Spatial Research - Focused on the Cryptography
title_fullStr The Type of Camouflaged Style in Spatial Research - Focused on the Cryptography
title_full_unstemmed The Type of Camouflaged Style in Spatial Research - Focused on the Cryptography
title_sort type of camouflaged style in spatial research - focused on the cryptography
publishDate 2009
url http://ndltd.ncl.edu.tw/handle/10723723534685664576
work_keys_str_mv AT hsuhsiaopin thetypeofcamouflagedstyleinspatialresearchfocusedonthecryptography
AT xǔxiǎopíng thetypeofcamouflagedstyleinspatialresearchfocusedonthecryptography
AT hsuhsiaopin jiànzhúyǐnfēnggézhīlèixíngyánjiūyǐmìmǎxuéjiāmìmóshìwèilì
AT xǔxiǎopíng jiànzhúyǐnfēnggézhīlèixíngyánjiūyǐmìmǎxuéjiāmìmóshìwèilì
AT hsuhsiaopin typeofcamouflagedstyleinspatialresearchfocusedonthecryptography
AT xǔxiǎopíng typeofcamouflagedstyleinspatialresearchfocusedonthecryptography
_version_ 1718033137537122304