Data hiding strategies have recently gained popularity in different fields; Digital watermark technology was developed for hiding copyright information in the image visually or invisibly. Today, 3D model technology has the potential to alter the field because it allows for the production of sophisticated structures and forms that were previously impossible to achieve. In this paper, a new watermarking method for the 3D model is presented. The proposed method is based on the geometrical and topology properties of the 3D model surface to increase the security. The geometrical properties are based on computing the mean curvature for a surface and topology based on the number of edges around each vertex, the vertices that have negative mean curvature and an odd number of edges around the vertex are selected for embedding. Selecting the vertex with negative mean curvature value means the vertex located in the deep region of the surface, so it not noticeable change to human eyes. To evaluate the performance of the proposed algorithm, the PSNR, and CF are used as a measurement to evaluate the visibility and robustness of the 3D watermarked model. The experimental results have shown the proposed algorithm has good imperceptibility where the PSNR reach up to 44.41 and robustness against attack where the CF is one in many cases.
The present paper agrees with estimation of scale parameter θ of the Inverted Gamma (IG) Distribution when the shape parameter α is known (α=1), bypreliminarytestsinglestage shrinkage estimators using suitable shrinkage weight factor and region. The expressions for the Bias, Mean Squared Error [MSE] for the proposed estimators are derived. Comparisons between the considered estimator with the usual estimator (MLE) and with the existing estimator are performed .The results are presented in attached tables.
The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide
... Show MoreThis paper is concerned with pre-test single and double stage shrunken estimators for the mean (?) of normal distribution when a prior estimate (?0) of the actule value (?) is available, using specifying shrinkage weight factors ?(?) as well as pre-test region (R). Expressions for the Bias [B(?)], mean squared error [MSE(?)], Efficiency [EFF(?)] and Expected sample size [E(n/?)] of proposed estimators are derived. Numerical results and conclusions are drawn about selection different constants included in these expressions. Comparisons between suggested estimators, with respect to classical estimators in the sense of Bias and Relative Efficiency, are given. Furthermore, comparisons with the earlier existing works are drawn.
المستخلص:
في هذا البحث , استعملنا طرائق مختلفة لتقدير معلمة القياس للتوزيع الاسي كمقدر الإمكان الأعظم ومقدر العزوم ومقدر بيز في ستة أنواع مختلفة عندما يكون التوزيع الأولي لمعلمة القياس : توزيع لافي (Levy) وتوزيع كامبل من النوع الثاني وتوزيع معكوس مربع كاي وتوزيع معكوس كاما وتوزيع غير الملائم (Improper) وتوزيع
... Show MoreThis paper proposed a new method to study functional non-parametric regression data analysis with conditional expectation in the case that the covariates are functional and the Principal Component Analysis was utilized to de-correlate the multivariate response variables. It utilized the formula of the Nadaraya Watson estimator (K-Nearest Neighbour (KNN)) for prediction with different types of the semi-metrics, (which are based on Second Derivative and Functional Principal Component Analysis (FPCA)) for measureing the closeness between curves. Root Mean Square Errors is used for the implementation of this model which is then compared to the independent response method. R program is used for analysing data. Then, when the cov
... Show MoreMachine learning-based techniques are used widely for the classification of images into various categories. The advancement of Convolutional Neural Network (CNN) affects the field of computer vision on a large scale. It has been applied to classify and localize objects in images. Among the fields of applications of CNN, it has been applied to understand huge unstructured astronomical data being collected every second. Galaxies have diverse and complex shapes and their morphology carries fundamental information about the whole universe. Studying these galaxies has been a tremendous task for the researchers around the world. Researchers have already applied some basic CNN models to predict the morphological classes
... Show MoreIn this paper, we used the maximum likelihood estimation method to find the estimation values ​​for survival and hazard rate functions of the Exponential Rayleigh distribution based on a sample of the real data for lung cancer and stomach cancer obtained from the Iraqi Ministry of Health and Environment, Department of Medical City, Tumor Teaching Hospital, depending on patients' diagnosis records and number of days the patient remains in the hospital until his death.
This study has applied digital image processing on three-dimensional C.T. images to detect and diagnose kidney diseases. Medical images of different cases of kidney diseases were compared with those of healthy cases. Four different kidneys disorders, such as stones, tumors (cancer), cysts, and renal fibrosis were considered in additional to healthy tissues. This method helps in differentiating between the healthy and diseased kidney tissues. It can detect tumors in its very early stages, before they grow large enough to be seen by the human eye. The method used for segmentation and texture analysis was the k-means with co-occurrence matrix. The k-means separates the healthy classes and the tumor classes, and the affected
... Show MoreThis paper is concerned with preliminary test single stage shrinkage estimators for the mean (q) of normal distribution with known variance s2 when a prior estimate (q0) of the actule value (q) is available, using specifying shrinkage weight factor y( ) as well as pre-test region (R). Expressions for the Bias, Mean Squared Error [MSE( )] and Relative Efficiency [R.Eff.( )] of proposed estimators are derived. Numerical results and conclusions are drawn about selection different constants including in these expressions. Comparisons between suggested estimators with respect to usual estimators in the sense of Relative Efficiency are given. Furthermore, comparisons with the earlier existi
... Show MoreThis Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters (as done in the first edition 2019). Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. While the revised new chapters have been added (as the curr
... Show More