In the last decade, 3D models gained interest in many applications, such as games, the medical field, and manufacture. It is necessary to protect these models from unauthorized copying, distribution, and editing. Digital watermarking is the best way to solve this problem. This paper introduces a robust watermarking method by embedding the watermark in the low-frequency domain, then selecting the coarsest level for embedding the watermark based on the strength factor. The invisibility of the watermark for the proposed algorithm is tested by using different measurements, such as HD and PSNR. The robustness was tested by using different types of attacks; the correlation coefficient was applied for the evaluation of the extracted watermark. From the results, it is clear that the proposed algorithm achieved good invisibility and robustness against the geometrical attack and the added noise.
Abstract
These experiments seek to investigate the effects of the fixed variations to the basic box plot on subjects' judgments of the box lengths. The study consists of two experiments, were constructed as an extension to the experiments carried out previously by Hussin, M.M. (1989, 2006). Subjects were asked to judge what percentage the shorter represented of the longer length in pairs of box lengths and give an estimate of percentage, one being a standard plot and the other being of a different box length and also varying with respect to other elements such as, box width or whisker length. When he (1989) suggested in the future research points (1, 2), the changing length of the st
... Show MoreIn our research, we introduced new concepts, namely *and **-light mappings, after we knew *and **-totally disconnected mappings through the use of -open sets.
Many examples, facts, relationships and results have been given to support our work.
Let L be a commutative ring with identity and let W be a unitary left L- module. A submodule D of an L- module W is called s- closed submodule denoted by D ≤sc W, if D has no proper s- essential extension in W, that is , whenever D ≤ W such that D ≤se H≤ W, then D = H. In this paper, we study modules which satisfies the ascending chain conditions (ACC) and descending chain conditions (DCC) on this kind of submodules.
Laser beam has been widely used to improve the mechanical properties of the metals. It used for cutting, drilling, hardening, welding……etc. The use of Laser beam has many features in accuracy and speeding in work, also in the treatment of metals locally, and in the places that is hard to reach by traditional ways. In this research a surface treatment was done to medium carbon steel (0.4%C) which is common kind of steel that is used in industry. Pulsing Neodymium -YAG Laser has been used and 1.06 micrometer wave length and 5 msec and the distance is about 30 centimeter between the exit area of the Laser beam from the system and the piece that treated . We are going to check the fatigue resistance for samples that is
... Show MoreThe present paper studies the generalized Φ- recurrent of Kenmotsu type manifolds. This is done to determine the components of the covariant derivative of the Riemannian curvature tensor. Moreover, the conditions which make Kenmotsu type manifolds to be locally symmetric or generalized Φ- recurrent have been established. It is also concluded that the locally symmetric of Kenmotsu type manifolds are generalized recurrent under suitable condition and vice versa. Furthermore, the study establishes the relationship between the Einstein manifolds and locally symmetric of Kenmotsu type manifolds.
كان لنهاية الحرب الباردة وعولمة العالم على وفق رؤية كونية تتجاوز حدود ومفاهيم السيادة الوطنية والقومية الاثر الواضح في ترتيب العلاقات الدولية , واصبحت تلك العلاقات تدور حول محورين الاول .. هو الاعتماد المتبادل بين الدول من اجل الوصول الى خطوط مشتركة للمصالح المختلفة بين هذه الدول . والآخر.. هو تبعية الدول الضعيفة للدول القوية لافتقار الاولى توفير الحاجيات الى مواطنيها . هذا يشير الى نشأة علا
... Show MoreWidely present in the environment, arsenic trioxide has been identified as a genotoxic substance that poses a serious risk to public health. The genotoxic potential of arsenic at low allowable dosage levels is assessed in this study. Four groups of twelve adult rats each were created from the 48 total. Animals in Group I were used as controls Chromosome abnormalities found in bone marrow cells were used to assess the mutagenic potential of arsenic. Hematological parameters were also assessed. At 60 and 90 days, the percentage of microsomal degranulation in the hepatic fraction increased and the amounts of RNA and proteins considerably reduced (P < 0.01) in all three dosages given. was employed in order to assess hematological par
... Show MoreCeramic coating compose from a ceramic mixture (MgO, Al2O3) and metall (Al-Ni) were produced by Thermal Spray Technique. The mixed ratio of used materials Al:Ni (50%) and 40% of Al2O3 and 10% MgO. This mixture was spray on a stainless steel substrate of type (316 L) by using thermal spray with flame method and at spraying distances (8, 12, 16 and 20) cm, then the prepared films were treated by laser and thermal treatment. After that performing a hardness and adhesion tests were eximined. The present study shows that the best value of the thermal treatment is 1000 ℃ for 30 mint; the optimum spray distance is 12 cm and most suitable laser is 500 mJ where the microscopic and mechanical character
... Show MoreDue to technological developments in the Iraqi banking sector, which is the use of electronic payment systems within the banking infrastructure. This has led to speed and accuracy in the completion of transactions, reduced costs, increased revenues and efficiency. This research examines the challenges and risks facing the Iraqi banking sector as a result of its use of electronic payment systems. And show its impact on the profitability of commercial banks. The research was based on the main hypothesis that there is a statistically significant moral impact relationship between electronic payment systems and the profitability of banks. Iraqi commercial banks were chosen as a research community, All Iraqi commercial banks that parti
... Show MoreMost companies use social media data for business. Sentiment analysis automatically gathers analyses and summarizes this type of data. Managing unstructured social media data is difficult. Noisy data is a challenge to sentiment analysis. Since over 50% of the sentiment analysis process is data pre-processing, processing big social media data is challenging too. If pre-processing is carried out correctly, data accuracy may improve. Also, sentiment analysis workflow is highly dependent. Because no pre-processing technique works well in all situations or with all data sources, choosing the most important ones is crucial. Prioritization is an excellent technique for choosing the most important ones. As one of many Multi-Criteria Decision Mak
... Show More