Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image recovery after applying JPEG coding to the watermarking image are included.
Inclination Of The Lumbosacral Angle In Normal Individuals: An Mri Study,GJRA - Global Journal For Research Analysis(GJRA) GJRA is a double reviewed monthly print journal that accepts research works. 36572+ Manuscript submission, 9855+ Research Paper Published, 100+ Articles from over 100 Countries
This study aims to study the political caricature and its indications in the Palestinian newspapers, to know its subjects, the active characters, the artistic styles, and the symbols the caricaturists use.
The study concluded that there is a variety of subjects that the political caricature handled in the studied newspapers and the degree of interest in every subject. The subjects related to the international subjects came first (% 24.5) and the other subjects came next (% 22.2).
The results showed the caricaturists relied on unnamed symbolic active characters that came first (% 62.3) and named symbolic characters (% 11.1). The positive characteristics of the Palestinian figures were higher than the negative ones, and the
... Show MoreCatalytic reforming of naphtha occupies an important issue in refineries for obtaining high octane gasoline and aromatic compounds, which are the basic materials of petrochemical industries. In this study, a novel of design parameters for industrial continuous catalytic reforming reactors of naphtha is proposed to increase the aromatics and hydrogen productions. Improving a rigorous mathematical model for industrial catalytic reactors of naphtha is studied here based on industrial data applying a new kinetic and deactivation model. The optimal design variables are obtained utilizing the optimization process in order to build the model with high accuracy and such design parameters are then applied to get the best configuration of this pro
... Show MoreIn this paper, we introduce and discuss an extended subclass〖 Ą〗_p^*(λ,α,γ) of meromorphic multivalent functions involving Ruscheweyh derivative operator. Coefficients inequality, distortion theorems, closure theorem for this subclass are obtained.
This study uses an Artificial Neural Network (ANN) to examine the constitutive relationships of the Glass Fiber Reinforced Polymer (GFRP) residual tensile strength at elevated temperatures. The objective is to develop an effective model and establish fire performance criteria for concrete structures in fire scenarios. Multilayer networks that employ reactive error distribution approaches can determine the residual tensile strength of GFRP using six input parameters, in contrast to previous mathematical models that utilized one or two inputs while disregarding the others. Multilayered networks employing reactive error distribution technology assign weights to each variable influencing the residual tensile strength of GFRP. Temperatur
... Show MoreIn networking communication systems like vehicular ad hoc networks, the high vehicular mobility leads to rapid shifts in vehicle densities, incoherence in inter-vehicle communications, and challenges for routing algorithms. It is necessary that the routing algorithm avoids transmitting the pockets via segments where the network density is low and the scale of network disconnections is high as this could lead to packet loss, interruptions and increased communication overhead in route recovery. Hence, attention needs to be paid to both segment status and traffic. The aim of this paper is to present an intersection-based segment aware algorithm for geographic routing in vehicular ad hoc networks. This algorithm makes available the best route f
... Show MoreRecently, the phenomenon of the spread of fake news or misinformation in most fields has taken on a wide resonance in societies. Combating this phenomenon and detecting misleading information manually is rather boring, takes a long time, and impractical. It is therefore necessary to rely on the fields of artificial intelligence to solve this problem. As such, this study aims to use deep learning techniques to detect Arabic fake news based on Arabic dataset called the AraNews dataset. This dataset contains news articles covering multiple fields such as politics, economy, culture, sports and others. A Hybrid Deep Neural Network has been proposed to improve accuracy. This network focuses on the properties of both the Text-Convolution Neural
... Show MoreAbstract-Servo motors are important parts of industry automation due to their several advantages such as cost and energy efficiency, simple design, and flexibility. However, the position control of the servo motor is a difficult task because of different factors of external disturbances, nonlinearities, and uncertainties. To tackle these challenges, an adaptive integral sliding mode control (AISMC) is proposed, in which a novel bidirectional adaptive law is constructed to reduce the control chattering. The proposed control has three steps to be designed. Firstly, a full-order integral sliding manifold is designed to improve the servo motor position tracking performance, in which the reaching phase is eliminated to achieve the invariance of
... Show MoreWith the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show More