Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various attacks.
Background: Using dual-energy X-ray absorptiometry, body fat mass has been determined. The assessment of body fat mass was conducted utilizing dual-energy X-ray absorptiometry analysis of the pelvis and vertebral column. While it is acknowledged that osteoporosis can impact both body fat mass and bone mineral density, the particulars of this relationship currently remain uncertain. Objective: The aim of the present investigation is to assess gender differences in the effects of osteoporosis on the body fat mass of the upper and lower extremities. Method: 170 individuals participated (85 males and 85 females) in this study. Patients who presented with bone discomfort consisted of 40 males and 40 females. In addition, 90 apparently he
... Show MoreAluminum plasma was generated by the irradiation of the target
with Nd: YAG laser operated at a wavelength of 1064 nm. The
effect of laser power density and the working pressure on spectral
lines generating by laser ablation, were detected by using optical
spectroscopy. The electron density was measured using the Stark
broadening of aluminum lines and the electron temperature by
Boltzmann plot method it is one of the methods that are used. The
electron temperature Te, electron density ne, plasma frequency
and Debye length increased with increasing the laser peak
power. The electron temperature decrease with increasing gas
pressure.
The aim of the research is to design educational software based on Web Quests and to measure its effectiveness in developing information search skills of students at the Department of Educational and Psychological Sciences. The research is experimental in nature using pre-post measurement. The research sample consisted of (91) male and female students from the second grade in the Department of Educational and Psychological Sciences, they were divided into two equal groups; the experimental group consisted of (47) students who adopted the educational software as a studying method, and the control group consisted of (44) students who follow the traditional method. The researchers prepared a list of skills for searching information and they
... Show MoreRates of zinc consumption during cathodic protection of a copper pipeline carrying saline water were measured by the loss in weight technique. The study of sacrificial anode cathodic protection of short copper tube using zinc strip extended axially in the pipe revealed that : (i) The increase of zinc consumption with time of exposure (1-3 h's) at different flow rates (turbulent flow) (300-600 l/hr) while the temperature , solution concentration and the pH were fixed at 20ºC, 3.5%wt NaCl, and pH=8 respectively in absence and presence of bacteria.(ii)Increase of zinc consumption with flow rates (300-600 l/hr) at different temperatures (10-40ºC) while solution concentration and time of exposure were fixed at 3.5 %wt NaCl and 3hr's respect
... Show MoreRates of zinc consumption during cathodic protection of a copper pipeline carrying saline water were measured by the loss in weight technique. The study of sacrificial anode cathodic protection of short copper tube using zinc strip extended axially in the pipe revealed that : (i) The increase of zinc consumption with time of exposure (1-3 h's) at different flow rates (turbulent flow) (300-600 l/hr) while the temperature , solution concentration and the pH were fixed at 20ºC, 3.5%wt NaCl, and pH=8 respectively in absence and presence of bacteria.(ii)Increase of zinc consumption with flow rates (300-600 l/hr) at different temperatures (10-40ºC) while solution concentration and time of exposure were fixed at 3.5 %wt NaCl and 3hr's respective
... Show MoreAbstract The wavelet shrink estimator is an attractive technique when estimating the nonparametric regression functions, but it is very sensitive in the case of a correlation in errors. In this research, a polynomial model of low degree was used for the purpose of addressing the boundary problem in the wavelet reduction in addition to using flexible threshold values in the case of Correlation in errors as it deals with those transactions at each level separately, unlike the comprehensive threshold values that deal with all levels simultaneously, as (Visushrink) methods, (False Discovery Rate) method, (Improvement Thresholding) and (Sureshrink method), as the study was conducted on real monthly data represented in the rates of theft crimes f
... Show MoreA Multiple System Biometric System Based on ECG Data
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More