Illegal distribution of digital data is a common danger in the film industry, especially with the rapid spread of the Internet, where it is now possible to easily distribute pirated copies of digital video on a global scale. The Watermarking system inserts invisible signs to the video content without changing the content itself. The aim of this paper is to build an invisible video watermarking system with high imperceptibility. Firstly, the watermark is confused by using the Arnold transform and then dividing into equal, non-overlapping blocks. Each block is then embedded in a specific frame using the Discrete Wavelet Transform (DWT), where the HL band is used for this purpose. Regarding the method of selecting the host frames, the chaotic map (tent map) was used to choose a number of frames which are greater or equal to the number of blocks of the watermark. The host frame selection method makes the discovery of the watermark information by illegal means very complicated. The experimental results show that the proposed method can produce excellent transparency with robustness against some attacks where the average_ PSNR reaches to 72.806.
In this article, the types of renewable energies and the environmental effects of consuming these energies are studied. Energy is one of the things necessary for economic and social development and improving the quality of life, and the presence of continuous and sustainable economic energy is essential for any economic development and growth. Humankind has been aware of renewable energies such as biomass and geothermal energy for a long time and has used these energies as heat sources for shelter. With the beginning of the extraction of fossil fuels such as oil and coal and unlimited access to these products, the use of renewable energy sources, except in remote places and forest areas, has become limited and forgotten. Currently in Iraq,
... Show MoreRate of zinc consumption during the cathodic protection of copper pipeline which carries saline water was measured by weight loss technique in the absence and presence of bacteria. Variables studied were solution flow rate, temperature, time and NaCl concentration. It was found that within the present range of variables; the rate of zinc consumption increases with the increase of all operating conditions. The presence of bacteria increases the zinc consumption. Fourth order multi-term model and one-term model were suggested to represent the consumption data. Nonlinear regression analysis was used to estimate the coefficients of these models, while statistical analysis was used to determine the effect of each coefficient. Both models were re
... Show MoreThe differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree
... Show MoreIn this study, a Hydroxyapatite (HA) coating was prepared on a titanium implant by an electrochemical deposition process. The titanium pre-treatment by anodizing in 1.65 mol/L sulfuric acid with (10V) at room temperature. The deposition was all conducted at a constant voltage of 6.0 V, for 1 h at room temperature. The coatings thus prepared were characterized with Fourier transform infrared spectroscopy (FTIR) and thickness of the coated layer.The electrochemical deposition of HA occurred on the titanium as a cathode. Coated titanium by HA after anodizing revealed a good corrosion protection efficiency even at a temperature ranged (293-323) K in artificial saliva. Activation energy and pre-exponential factor (kinetic parameters) were calcul
... Show MoreBlockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%,
... Show MoreThe background subtraction is a leading technique adopted for detecting the moving objects in video surveillance systems. Various background subtraction models have been applied to tackle different challenges in many surveillance environments. In this paper, we propose a model of pixel-based color-histogram and Fuzzy C-means (FCM) to obtain the background model using cosine similarity (CS) to measure the closeness between the current pixel and the background model and eventually determine the background and foreground pixel according to a tuned threshold. The performance of this model is benchmarked on CDnet2014 dynamic scenes dataset using statistical metrics. The results show a better performance against the state-of the art
... Show MoreFR Almoswai, BN Rashid, PEOPLE: International Journal of Social Sciences, 2017 - Cited by 22
Videogames are currently one of the most widespread means of digital communication and entertainment; their releases are attracting considerable interest with growing number of audience and revenues each year. Videogames are examined by a variety of disciplines and fields. Nevertheless, scholarly attention concerned with the discourse of videogames from a linguistic perspective is relatively scarce, especially from a pragma-stylistic standpoint. This book addresses this vital issue by providing a pragma-stylistic analysis of the digital discourse of two well-known action videogames (First Person Shooter Games). It explores the role of the digital discourse of action videogames in maintaining real-like interactivity between the game and the
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreThe Corrosion protection effectiveness of Alimina(Al2O3,50nm)and Zinc oxide (ZnO,30nm) nanoparticales were studied on carbon steel and 316 stainless steel alloys in saline water (3.5%NaCl)at four temperatures: (20,30,40,50 OC)using three electrodes potentiostat. An average corrosion protection efficiencies of 65 %and 80% was achieved using Al2O3 NP's on carbon steel and stainless steel samples respectively, and it seems that no effect of rising temperature on the performances of the coated layers. While ZnO NP'S showed protection efficiency around 65% for the two alloys and little effected by temperature rising on the performanes of the coated layers. The morphology of the coated spesiemses was examined by Atomic force microscope.