In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB domain. The applied modulation technique is based on making uniform quantization to the block mean value of the color bands. The tests indicated that the proposed block mean modulation method of the sprite blocks showed robust watermark embedding; it was capable to withstand against lossy JPEG.
Wastewater treatment plants operators prefer to make adjustments because they are more cost effective, to use the existing tank instead of building new ones. In this case an imported materials would be used as bio-loads to increase biomass and thus maintain efficiency as the next organic loading increases.In the present study, a local substance "pumice stone" was used as a biological carrier in the aeration tank, and the experiments were carried out in five stages: without biological carriers, filling ratio of 4%,10%,20%, and25% with pumice stone, the maximum organic loading at each stage (1.1884, 1.2144, 1.9432, 2.7768, 3.3141)g BOD /l.d respectively.Other experiments were carried out to determine the best filling ratio, the SS remova
... Show MoreThis study relates to synthesis of bentonite-supported iron/copper nanoparticles through the biosynthesis method using eucalyptus plant leaf extract, which were then named E-Fe/Cu@B-NPs. The synthesised E-Fe/Cu@B-NPs were examined by a set of experiments involving a heterogeneous Fenton-like process that removed direct blue 15 (DB15) dye from wastewater. The resultant E-Fe/Cu@B-NPs were characterised by scanning electron microscopy, Brunauer–Emmet–Teller analysis, zeta potential analysis, Fourier transform infrared spectroscopy and atomic force microscopy. The operating parameters in batch experiments were optimised using Box–Behnken design. These parameters were pH, hydrogen peroxide (H2O2
... Show MoreNeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among
A genetic algorithm model coupled with artificial neural network model was developed to find the optimal values of upstream, downstream cutoff lengths, length of floor and length of downstream protection required for a hydraulic structure. These were obtained for a given maximum difference head, depth of impervious layer and degree of anisotropy. The objective function to be minimized was the cost function with relative cost coefficients for the different dimensions obtained. Constraints used were those that satisfy a factor of safety of 2 against uplift pressure failure and 3 against piping failure.
Different cases reaching 1200 were modeled and analyzed using geo-studio modeling, with different values of input variables. The soil wa
This study includes using green or biosynthesis-friendly technology, which is effective in terms of low cost and low time and energy to prepare V2O5NPs nanoparticles from vanadium sulfate VSO4.H2O using aqueous extract of Punica Granatum at a concentration of 0.1M and with a basic medium PH= 8-12. The V2O5NPs nanoparticles were diagnosed using several techniques, such as FT-IR, UV-visible with energy gap Eg = 3.734eV, and the X-Ray diffraction XRD was calculated using the Debye Scherrer equation. It was discovered to be 34.39nm, Scanning Electron Microscope (SEM), Transmission Electron Microscopy TEM. The size, structure, and composition of synthetic V2O5
... Show MoreAbstract: Recently, there is increasing interest in using mode-division multipelexing (MDM) technique to enhace data rate transmission over multimode fibers. In this technique, each fiber mode is treated as a separate optical carrier to transfer its own data. This paper presents a broadband, compact, and low loss three-mode (de)multiplexer designed for C+L band using subwavelength grating (SWG) technology and built-in silicon-on-insulator SOI platform. SWG offers refractive index engineering for wider operating bandwidth and compact devices compared to conventional ones. The designed (de)multiplex deals with three modes (TE0, TE1, and TE2) and has a loss > -1 dB and crosstalk < −15 dB, and its operation c
... Show MoreThe δ-mixing ratios have been calculated for several γ-transitions in 90Mo using the 𝛔 𝐉 method. The results are compared with other references the agreement is found to be very good .this confirms the validity of the 𝛔 𝐉 method as a tool for analyzing the angular distribution of γ-ray. Key word: population parameter, γ-ray transition, 𝛔 𝐉 method, multiple mixing ratios.
: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show More