The Type of Camouflaged Style in Spatial Research - Focused on the Cryptography
碩士 === 國立臺南藝術大學 === 建築藝術研究所 === 98 === In reviewing the history of development of architecture, we could find that after the basic installation demands from architecture were satisfied, it would turn to decorative vocabulary symbolizing times and develop various forms and styles of architecture....
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/10723723534685664576 |
id |
ndltd-TW-098TNCA5639017 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-098TNCA56390172015-10-13T18:25:51Z http://ndltd.ncl.edu.tw/handle/10723723534685664576 The Type of Camouflaged Style in Spatial Research - Focused on the Cryptography 建築「隱風格」之類型研究-以密碼學加密模式為例 Hsu, Hsiao- Pin 許筱萍 碩士 國立臺南藝術大學 建築藝術研究所 98 In reviewing the history of development of architecture, we could find that after the basic installation demands from architecture were satisfied, it would turn to decorative vocabulary symbolizing times and develop various forms and styles of architecture. However, the evolution of architecture is based on the breakthrough of predecessors’ thinking that it is important to construct a set of rules for changing existed forms and style of architecture. The changes could not only enhance spatial interest as well as evolve the styles of architecture to continue the styles of architecture but also realize the co-existence and the compromise of the styles in different regions and integrate them into environments. Given that the encryption theory in cryptography is also based on the manipulation of human visual inertia and the contravention of general cognition to encrypt that will diversity the cipher text, the encryption theory has effects of form reforms. So the extraction of encryption model may act as a reference to help the architecture in the development of building form of “Camouflaged Style” to create a new vision. Therefore, the research analyzed the encryption model of cryptography and combined with the types of operating elements of “encryption clear-text” and “architecture style” and parallel and analogue construction of formation model that would act as the base of follow-up operation methods. In the meantime, through the reorganization of the theories including the “Syntactic theory” of architecture in the principles of visual illusion, art systems and post-modern architecture, and verification and confirmation by a lot of cases, the research formed a set of encryption rules in the operation systems of the formation model of spatial element of “deformation” and the constitutive model of spatial organization of “sequence change” that would establish the procedure system of encryption of spatial “style” of architecture. The system would be realized and applied to the spatial operation to create the possibility of encryption of style and formation. Chiang, Kuan-Hsun Wang, Wei-ho 江冠勳 王為河 2009 學位論文 ; thesis 130 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺南藝術大學 === 建築藝術研究所 === 98 === In reviewing the history of development of architecture, we could find that after the basic installation demands from architecture were satisfied, it would turn to decorative vocabulary symbolizing times and develop various forms and styles of architecture. However, the evolution of architecture is based on the breakthrough of predecessors’ thinking that it is important to construct a set of rules for changing existed forms and style of architecture. The changes could not only enhance spatial interest as well as evolve the styles of architecture to continue the styles of architecture but also realize the co-existence and the compromise of the styles in different regions and integrate them into environments.
Given that the encryption theory in cryptography is also based on the manipulation of human visual inertia and the contravention of general cognition to encrypt that will diversity the cipher text, the encryption theory has effects of form reforms. So the extraction of encryption model may act as a reference to help the architecture in the development of building form of “Camouflaged Style” to create a new vision.
Therefore, the research analyzed the encryption model of cryptography and combined with the types of operating elements of “encryption clear-text” and “architecture style” and parallel and analogue construction of formation model that would act as the base of follow-up operation methods. In the meantime, through the reorganization of the theories including the “Syntactic theory” of architecture in the principles of visual illusion, art systems and post-modern architecture, and verification and confirmation by a lot of cases, the research formed a set of encryption rules in the operation systems of the formation model of spatial element of “deformation” and the constitutive model of spatial organization of “sequence change” that would establish the procedure system of encryption of spatial “style” of architecture. The system would be realized and applied to the spatial operation to create the possibility of encryption of style and formation.
|
author2 |
Chiang, Kuan-Hsun |
author_facet |
Chiang, Kuan-Hsun Hsu, Hsiao- Pin 許筱萍 |
author |
Hsu, Hsiao- Pin 許筱萍 |
spellingShingle |
Hsu, Hsiao- Pin 許筱萍 The Type of Camouflaged Style in Spatial Research - Focused on the Cryptography |
author_sort |
Hsu, Hsiao- Pin |
title |
The Type of Camouflaged Style in Spatial Research - Focused on the Cryptography |
title_short |
The Type of Camouflaged Style in Spatial Research - Focused on the Cryptography |
title_full |
The Type of Camouflaged Style in Spatial Research - Focused on the Cryptography |
title_fullStr |
The Type of Camouflaged Style in Spatial Research - Focused on the Cryptography |
title_full_unstemmed |
The Type of Camouflaged Style in Spatial Research - Focused on the Cryptography |
title_sort |
type of camouflaged style in spatial research - focused on the cryptography |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/10723723534685664576 |
work_keys_str_mv |
AT hsuhsiaopin thetypeofcamouflagedstyleinspatialresearchfocusedonthecryptography AT xǔxiǎopíng thetypeofcamouflagedstyleinspatialresearchfocusedonthecryptography AT hsuhsiaopin jiànzhúyǐnfēnggézhīlèixíngyánjiūyǐmìmǎxuéjiāmìmóshìwèilì AT xǔxiǎopíng jiànzhúyǐnfēnggézhīlèixíngyánjiūyǐmìmǎxuéjiāmìmóshìwèilì AT hsuhsiaopin typeofcamouflagedstyleinspatialresearchfocusedonthecryptography AT xǔxiǎopíng typeofcamouflagedstyleinspatialresearchfocusedonthecryptography |
_version_ |
1718033137537122304 |