In present work the effort has been put in finding the most suitable color model for the application of information hiding in color images. We test the most commonly used color models; RGB, YIQ, YUV, YCbCr1 and YCbCr2. The same procedures of embedding, detection and evaluation were applied to find which color model is most appropriate for information hiding. The new in this work, we take into consideration the value of errors that generated during transformations among color models. The results show YUV and YIQ color models are the best for information hiding in color images.
Krawtchouk polynomials (KPs) and their moments are promising techniques for applications of information theory, coding theory, and signal processing. This is due to the special capabilities of KPs in feature extraction and classification processes. The main challenge in existing KPs recurrence algorithms is that of numerical errors, which occur during the computation of the coefficients in large polynomial sizes, particularly when the KP parameter (p) values deviate away from 0.5 to 0 and 1. To this end, this paper proposes a new recurrence relation in order to compute the coefficients of KPs in high orders. In particular, this paper discusses the development of a new algorithm and presents a new mathematical model for computing the
... Show MoreVisual analytics becomes an important approach for discovering patterns in big data. As visualization struggles from high dimensionality of data, issues like concept hierarchy on each dimension add more difficulty and make visualization a prohibitive task. Data cube offers multi-perspective aggregated views of large data sets and has important applications in business and many other areas. It has high dimensionality, concept hierarchy, vast number of cells, and comes with special exploration operations such as roll-up, drill-down, slicing and dicing. All these issues make data cubes very difficult to visually explore. Most existing approaches visualize a data cube in 2D space and require preprocessing steps. In this paper, we propose a visu
... Show MoreThis paper reports an evaluation of the properties of medium-quality concrete incorporating recycled coarse aggregate (RCA). Concrete specimens were prepared with various percentages of the RCA (25%, 50%, 75%, and 100%). The workability, mechanical properties, and durability in terms of abrasion of cured concrete were examined at different ages. The results reveal insignificant differences between the recycled concrete (RC) and reference concrete in terms of the mechanical and durability-related measurements. Meanwhile, the workability of the RC reduced vastly since the replacement of the RCA reached 75% and 100%. The ultrasound pulse velocity (UPV) results greatly depend on the porosity of concrete and the RC exhibited higher poros
... Show MoreMulti-walled carbon nanotubes from cheap tubs company MWCNT-CP were purified by alcohol \ H2O2 \ separation funnel which is simple, easy and scalable techniques. The steps of purification were characterized by X-ray diffraction, Raman spectroscopy, scanning electron microscopy SEM with energy dispersive of X-ray spectroscopy EDX and surface area measurements. The technique was succeeded to remove most the trace element from MWCNT-CP which causing increase the surface area. The ratios of impurities were reduced to less 0.6% after treatment by three steps with losing less than 5% from MWCNT-CP.
Phishing is an internet crime achieved by imitating a legitimate website of a host in order to steal confidential information. Many researchers have developed phishing classification models that are limited in real-time and computational efficiency. This paper presents an ensemble learning model composed of DTree and NBayes, by STACKING method, with DTree as base learner. The aim is to combine the advantages of simplicity and effectiveness of DTree with the lower complexity time of NBayes. The models were integrated and appraised independently for data training and the probabilities of each class were averaged by their accuracy on the trained data through testing process. The present results of the empirical study on phishing websi
... Show MoreThe current study aims to investigate the second cycle students’ motives for using electronic games in Oman. The sample consisted of (570) students, (346 males and 224 females). The participants completed an open-ended question which was analyzed based on ground theory. The results showed that (46.820%) of the males and (77.678) of the females played electronic games for pleasure, entertainment, and fun. This first category of motivation got the highest percentage of frequency (58.947%). The motive to become a hacker, a popular YouTuber got the lowest percentage (2.280%). Other students’ motives toward playing electronic games included: filling the leisure time, overcoming boredom, feeling adventures, getting science fiction and chal
... Show More