Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD on it, the diagonal matrix is selected to determine its norm. The four norms will be processed to produce one unique number used as a watermark and this number can be developed in future by exploiting some other features in constructing watermark number other than SVD process to construct two watermark numbers, each one of them owned special methodology, for avoiding some challenges and changings in the transformation process.
In this work, the adsorption of crystal violet dye from aqueous solution on charcoal and rice husk has been investigated, where the impact of variable factors (contact time; the dosage of adsorbent, pH, temperature, and ionic strength) have been studied. It has been found that charcoal and rice husk have an appropriate adsorption limit with regards to the expulsion of crystal violet dye from fluid arrangements. The harmony adsorption is for all intents and purposes accomplished in 45 min for charcoal and 60 min for rice husk. The amount of crystal violet dye adsorbed (0.4 g of charcoal and 0.5 g of rice husk) increased with an increasing pH and the value of 11 is the best
... Show MoreMany of researchers have written about social responsibility and business strategy and competitive advantage, and they have given particular attention to the relationship between economic and social responsibility , but what is missing in this aspect is how the economic units that use their core competencies to advance social responsibility initiatives so that they can achieve a significant competitive advantage and create value for it ?
The current research aims to verify the view that "the economic and social objectives in the long term is not contradictory in nature but complementary objectives essential", as well as make sure that the s
... Show Moreتناول البحث معرفة التأثير الطارد للمستخلصات المائية والكحولية والزيتية لبذور نبات الخروع Ricinus communis وبالتراكيز (20,15,10,5,2)% ومعرفة تأثيرها الطارد على بالغات بعوض Culex pipiens molestus باستخدام طيورالحمام كمصدر غذائي ،كما تناول البحث معرفة التأثير الطارد للمستخلص الزيتي على ايدي المتبرعين وبالمقارنه مع الطارد التجاري OF insect repellent أظهرت النتائج تفوق المستخلص
It is uncertain whether terminal ileum intubation should be performed routinely during colonoscopy, as there is uncertainty regarding its diagnostic value. The aim of the present study is to assess the diagnostic yield of terminal ileum intubation during colonoscopy according to indications for colonoscopy. This is a cross-sectional study in which the results of 294 total colonoscopy procedures were reviewed; ileal intubation was performed in 269 (91.49%) patients. The indications for colonoscopy, the results of ileoscopy, and the histopathological results of ileal biopsies were evaluated.
A total of 54 (20%) out of 269 patients who had successful intubation into the terminal ileum sh
This research aims at building a proposed training program according to the self-regulated strategies for the mathematics teachers and to identify the effect of this program on relational Mathematics of teachers. The sample of the research was (60) Math teachers; (30) teachers as experimental group and (30) teachers as control group. The results of the current research reacheded that the proposed training program according to some self-managed learning strategies, meets the needs of trainees with remarkable effectiveness to improve the level of their teaching performance to achieve the desired goals. Training teacher according to self-managed learning strategies is effective in bringing about the transition of training to their students
... Show MoreIn this paper the method of singular value decomposition is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.
Today in the digital realm, where images constitute the massive resource of the social media base but unfortunately suffer from two issues of size and transmission, compression is the ideal solution. Pixel base techniques are one of the modern spatially optimized modeling techniques of deterministic and probabilistic bases that imply mean, index, and residual. This paper introduces adaptive pixel-based coding techniques for the probabilistic part of a lossy scheme by incorporating the MMSA of the C321 base along with the utilization of the deterministic part losslessly. The tested results achieved higher size reduction performance compared to the traditional pixel-based techniques and the standard JPEG by about 40% and 50%,
... Show MoreThis study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database
... Show MoreIn this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.