Javascript must be enabled to continue!
YURI SOBOLEV’S CULTURAL CIPHER SYSTEM
View through CrossRef
This article focuses on Y. Sobolev's artistic work in different media: magazine illustration, independent graphics, animation and video-art, in which he practiced playing with images taken from different eras of art history. The author is interested in the degree of independence and originality of the artist in addressing heterogeneous traditions and pre-existing images. This article aims to use examples of his works to illustrate specificity of Sobolev's imagery, as he embodied his interest in metaphysics, esoterics and codes of other cultures in his art. The author aims to reveal and analyse the intercontextual practices of the artist, their peculiarities with the consideration of the genre of his projects, the search for the background of Y. Sobolev's original vision of art in his biography and his personal preferences in literary and philosophical fields. The description and analysis of the artist's works in different media were used as a method, with the focus on the works of Y. Sobolev in the illustrations for the popular science periodicals, in particular, for the “Znanie sila” magazine and “Nauka i mankind” anthology. After the research it was established that Y. Sobolev, while actively referring to a wide range of contexts, never was eclectic, but created meta-cultural artistic space according to its own logic, according to which dialogue with the past serves to better disclose the new meanings and challenges emerging with the development of science and progress of the second half of the 20th century. The individual works of the artist are put together into a coherent work, in which he involved contemporary artists as well. In the scientific literature, a comprehensive approach to the chosen topic with a description and analysis of the specific illustrations appearing in this text has not yet been given.
Title: YURI SOBOLEV’S CULTURAL CIPHER SYSTEM
Description:
This article focuses on Y.
Sobolev's artistic work in different media: magazine illustration, independent graphics, animation and video-art, in which he practiced playing with images taken from different eras of art history.
The author is interested in the degree of independence and originality of the artist in addressing heterogeneous traditions and pre-existing images.
This article aims to use examples of his works to illustrate specificity of Sobolev's imagery, as he embodied his interest in metaphysics, esoterics and codes of other cultures in his art.
The author aims to reveal and analyse the intercontextual practices of the artist, their peculiarities with the consideration of the genre of his projects, the search for the background of Y.
Sobolev's original vision of art in his biography and his personal preferences in literary and philosophical fields.
The description and analysis of the artist's works in different media were used as a method, with the focus on the works of Y.
Sobolev in the illustrations for the popular science periodicals, in particular, for the “Znanie sila” magazine and “Nauka i mankind” anthology.
After the research it was established that Y.
Sobolev, while actively referring to a wide range of contexts, never was eclectic, but created meta-cultural artistic space according to its own logic, according to which dialogue with the past serves to better disclose the new meanings and challenges emerging with the development of science and progress of the second half of the 20th century.
The individual works of the artist are put together into a coherent work, in which he involved contemporary artists as well.
In the scientific literature, a comprehensive approach to the chosen topic with a description and analysis of the specific illustrations appearing in this text has not yet been given.
Related Results
Attacks on the Random Gamming Code
Attacks on the Random Gamming Code
In 1917, Hilbert Vernam patented a top-secret encryption scheme, which at first was called a one-time notepad and later a Vernam cipher. At the time that Vernam proposed this schem...
IMPLEMENTASI DOUBLE CAESAR CIPHER MENGGUNAKAN ASCII
IMPLEMENTASI DOUBLE CAESAR CIPHER MENGGUNAKAN ASCII
In this paper, it will discuss about the merger between caesar cipher with caesar cipher or called double caesar cipher. In this study will show the design of the double caesar cip...
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
This paper investigates the encryption efficiency of RC6 block cipher application to digital
images, providing a new mathematical measure for encryption efficiency, which we ...
Dynamical approaches to Sharp Sobolev inequalities
Dynamical approaches to Sharp Sobolev inequalities
Inégalités de Sobolev optimales : approches dynamiques
Les inégalités de Sobolev, depuis leur preuve en 1938, ont été l'objet d'une intense recherche, et ont permis...
Symmetric Encryption Algorithm using ASCII Values
Symmetric Encryption Algorithm using ASCII Values
Cryptography at its very core is nothing but math - pure, simple, undiluted math. Math created algorithms that are basics for various encryption algorithm. Encryption is a method i...
Perancangan Kriptografi Block Cipher berbasis Pola Dribbling Practice
Perancangan Kriptografi Block Cipher berbasis Pola Dribbling Practice
Block cipher merupakan salah satu teknik dalam kriptografi modern yang digunakan untuk melakukan enkripsi/dekripsi pada data digital dengan membagi pesan menjadi blok-blok data dan...
Introduction Of A Multikey Multiround Chaining Scheme For The Vigenère cipher
Introduction Of A Multikey Multiround Chaining Scheme For The Vigenère cipher
This paper introduces the JAM Stream cipher, an improved version of the classical Vigenère cipher, designed to address its known vulnerabilities. The proposed cipher technique inco...
Chaotic Encryption Scheme for Double Grayscale Images using Sprott B Hyperchaotic Map
Chaotic Encryption Scheme for Double Grayscale Images using Sprott B Hyperchaotic Map
Image encryption become more significant since most of our data are communicated and stored as digital image form. To warrant high confidentiality, cipher image must be the produce...

