Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various attacks.
This paper presents a brief study undertaken for improving the performance of information and communication management of construction projects through investing in information and communication technologies (ICT). The work aims at first to investigate and diagnose the problems, challenges, weaknesses, and inefficiencies related to information and communication management in projects in the construction industry of Iraq. Studying the diagnosed matters and the different solutions of ICT to improve project management performance is following the investigation process. The research presents a technological system suggested to process a lot of the diagnosed problems, challenges, weakness, and inefficiencies of the construction projects and t
... Show More|
The international organizations showed their interest in the marketable public relations, with their activities, means and strategies, they play a crucial role in marketing products, services and ideas of the institution. They are considered to be the link between the company and its public, They are responsible for presenting the institution to the public, with honest transmission of the information. This gives a good impression to the institution, in a way the institution and its products become consistent with the needs and interests of the public. Based on this, the research aims to identify the strategies used by the marketable public relations internationally. The r |
Organizations adopt a number of procedures and instructions in their field of activities in order to aid their resources development and energies to serve their entrepreneurial orientations. This calls for preparing a range of mechanisms to mitigate the strictness and complexity of procedures. The ambiguity and severe complexity of procedures means acknowledging the loss in energy and this in turn impedes the hopes while in the same time weakens the enthusiasm in these organizations and an impedes the possibility to achieve continues innovation, thereby losing opportunities to the level of surrender to the risks and assuming them to be unconquered obstacles.
There
... Show MoreReverse Osmosis (RO) has already proved its worth as an efficient treatment method in chemical and environmental engineering applications. Various successful RO attempts for the rejection of organic and highly toxic pollutants from wastewater can be found in the literature over the last decade. Dimethylphenol is classified as a high-toxic organic compound found ubiquitously in wastewater. It poses a real threat to humans and the environment even at low concentration. In this paper, a model based framework was developed for the simulation and optimisation of RO process for the removal of dimethylphenol from wastewater. We incorporated our earlier developed and validated process model into the Species Conserving Genetic Algorithm (SCG
... Show MoreBN Rashid, International Journal of Research in Social Sciences and Humanities, 2019 - Cited by 1
The activation and reaction energies of the C-C and C-H bonds cleavage in pyrene molecule are calculated applying the Density Functional Theory and 6-311G Gaussian basis. Different values for the energies result for the different bonds, depending on the location of the bond and the structure of the corresponding transition states. The C-C bond cleavage reactions include H atom migration, in many cases, leading to the formation of CH2 groups and H-C≡C- acetylenic fragments. The activation energy values of the C-C reactions are greater than 190.00 kcal/mol for all bonds, those for the C-H bonds are greater than 160.00 kcal/mol. The reaction energy values for the C-C bonds range between 56.497 to 191.503 kcal/mol. As for the C-H cleavage rea
... Show MoreThe article considers metaphors as one of the fundamental means used by L. Ulitskaya when writing the family chronicle "Medea and her Children" (1996), for the formation of images of heroines - representatives of the pronounced feminine principle in the work. Here I describe the results of the next stage of research related to the work of Lyudmila Evgenievna Ulitskaya as a representative of modern Russian prose.
Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated. This work studies and analyzes some research trends focused on blockchain
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show More