Preferred Language
Articles
/
iRe2vY0BVTCNdQwC8hrC
A Blind Video Copyright Protection Technique in Maximum and Minimum Energy Frames Based on The Fast Walsh Hadamard Transform (FWHT) and Discrete Wavelet Transform (DWT) and Arnold Map
...Show More Authors

Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various attacks.

Scopus Crossref
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Opcion
Fast-slow thinking and its relationship to cognitive failure At university students
...Show More Authors

Scopus
Publication Date
Tue Dec 03 2013
Journal Name
Baghdad Science Journal
Satellite Images Unsupervised Classification Using Two Methods Fast Otsu and K-means
...Show More Authors

Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Satellite Images Unsupervised Classification Using Two Methods Fast Otsu and K-means
...Show More Authors

Two unsupervised classifiers for optimum multithreshold are presented; fast Otsu and k-means. The unparametric methods produce an efficient procedure to separate the regions (classes) by select optimum levels, either on the gray levels of image histogram (as Otsu classifier), or on the gray levels of image intensities(as k-mean classifier), which are represent threshold values of the classes. In order to compare between the experimental results of these classifiers, the computation time is recorded and the needed iterations for k-means classifier to converge with optimum classes centers. The variation in the recorded computation time for k-means classifier is discussed.

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 16 2022
Journal Name
2022 Muthanna International Conference On Engineering Science And Technology (micest)
Fast Synthesis and Characterization of Nano-SSZ-13 Zeolite by Hydrothermal Method
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A Study on the Accuracy of Prediction in Recommendation System Based on Similarity Measures
...Show More Authors

Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Proceeding Of Second Thermal And Fluids Engineering Conference
Solidification Enhancement in Triplex-Tube Latent Thermal Energy Storage System Using a Combination of Nanoparticles and Fins
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A comparative study of Gaussian mixture algorithm and K-means algorithm for efficient energy clustering in MWSN
...Show More Authors

Wireless sensor networks (WSNs) represent one of the key technologies in internet of things (IoTs) networks. Since WSNs have finite energy sources, there is ongoing research work to develop new strategies for minimizing power consumption or enhancing traditional techniques. In this paper, a novel Gaussian mixture models (GMMs) algorithm is proposed for mobile wireless sensor networks (MWSNs) for energy saving. Performance evaluation of the clustering process with the GMM algorithm shows a remarkable energy saving in the network of up to 92%. In addition, a comparison with another clustering strategy that uses the K-means algorithm has been made, and the developed method has outperformed K-means with superior performance, saving ener

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Estimation of nonparametric regression function using shrinkage wavelet and different mother functions
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
Obscene speech in the Qur'anic perspective An objective study based on the verses and interpretation of the Noble Qur’an in diagnosis and treatment
...Show More Authors

t:

The most famous thing a person does is talk. He loves and hates, and continues with it confirming relationships, and with it, too, comes out of disbelief into faith. Marry a word and separate with a word. He reaches the top of the heavens with a kind word, with which he will gain the pleasure of God, and the Lord of a word that the servant speaks to which God writes with our pleasure or throws him on his face in the fire. Emotions are inflamed, the United Nations is intensified with a word, and relations between states and war continue with a word.

What comes out of a person’s mouth is a translator that expresses the repository of his conscience and reveals the place of his bed, for it is evidence of

... Show More
View Publication Preview PDF