In the last decade, 3D models gained interest in many applications, such as games, the medical field, and manufacture. It is necessary to protect these models from unauthorized copying, distribution, and editing. Digital watermarking is the best way to solve this problem. This paper introduces a robust watermarking method by embedding the watermark in the low-frequency domain, then selecting the coarsest level for embedding the watermark based on the strength factor. The invisibility of the watermark for the proposed algorithm is tested by using different measurements, such as HD and PSNR. The robustness was tested by using different types of attacks; the correlation coefficient was applied for the evaluation of the extracted watermark. From the results, it is clear that the proposed algorithm achieved good invisibility and robustness against the geometrical attack and the added noise.
Let R be a commutative ring with identity, and let M be a unitary left R-module. M is called Z-regular if every cyclic submodule (equivalently every finitely generated) is projective and direct summand. And a module M is F-regular if every submodule of M is pure. In this paper we study a class of modules lies between Z-regular and F-regular module, we call these modules regular modules.
Let R be a commutative ring with identity and let M be a unital left R-module.
A.Tercan introduced the following concept.An R-module M is called a CLSmodule
if every y-closed submodule is a direct summand .The main purpose of this
work is to develop the properties of y-closed submodules.
The aim of this paper is to introduce and study the concept of SN-spaces via the notation of simply-open sets as well as to investigate their relationship to other topological spaces and give some of its properties.
in recent years cryptography has played a big role especially in computer science for information security block cipher and public
In this paper ,we introduce a concept of Max– module as follows: M is called a Max- module if ann N R is a maximal ideal of R, for each non– zero submodule N of M; In other words, M is a Max– module iff (0) is a *- submodule, where a proper submodule N of M is called a *- submodule if [ ] : N K R is a maximal ideal of R, for each submodule K contains N properly. In this paper, some properties and characterizations of max– modules and *- submodules are given. Also, various basic results a bout Max– modules are considered. Moreover, some relations between max- modules and other types of modules are considered.
... Show MoreGangyong Lee, S.Tariq Rizvi, and Cosmin S.Roman studied Rickart modules.
The main purpose of this paper is to develop the properties of Rickart modules .
We prove that each injective and prime module is a Rickart module. And we give characterizations of some kind of rings in term of Rickart modules.
Let be a right module over a ring with identity. The semisecond submodules are studied in this paper. A nonzero submodule of is called semisecond if for each . More information and characterizations about this concept is provided in our work.
Let R be commutative ring with identity and let M be any unitary left R-module. In this paper we study the properties of ec-closed submodules, ECS- modules and the relation between ECS-modules and other kinds of modules. Also, we study the direct sum of ECS-modules.
This research aims toknow the learning styles according to the model of Felder and Silverman and its relationship to effectively self- perceived mathematicalamong students of the Faculty of Education Pure Sciences - Ibn al-Haytham. By answering the following questions: 1. What are the preferred methods of learning among students in the mathematics department according to the model Felder and Silverman? 2. What is the mathematicalself-perceived levelof the students at the Department of Mathematics effectiveness level? 3. What is the relationship between learning styles according to the Felder model and Silverman and the effectiveness of mathematical self-perceived of the students of the Department of Mathematics? The research sample consiste
... Show MoreIs hardly day expire without hearing the news either Abuse Managementthe accounting standards or the existence of serious misstatements by someauditors.Which caused the demanding of many companies in the recent republication of the financial statements and the re-announcement of its financialresults. Such acts raise questioning about the role that should be played by theauditors, prompting agencies responsible for setting auditing standards to takeTo throw increasingly responsibility on the auditors in order to interest risksfraud The Risks of Fraud in their review of the financial statements.also The Public Company Accounting Oversight Board in the U.S.called about the need of owning the Certified Public Accountants those whoaudits for
... Show More