Preferred Language
Articles
/
ijs-930
Static and Dynamic Video Summarization

Video represented by a large number of frames synchronized with audio making video saving requires more storage, it's delivery slower, and computation cost expensive. Video summarization provides entire video information in minimum amount of time. This paper proposes static and dynamic video summarization
methods. The proposed static video summarization method includes several steps which are extracting frames from video, keyframes selection, feature extraction and description, and matching feature descriptor with bag of visual words, and finally save frames when features matched. The proposed dynamic video summarization
method includes in general extracting audio from video, calculating audio features using the average of samples in windows and find the highest average which reflects portion of video with loudest sound. The experimental results for the proposed static video summarization show that there is no redundancy between selected representative keyframes and the subjective evaluation results ensure the importance of the selected keyframes. While the experimental results for the proposed static video summarization show that all the segments of goals have been extracted to provide video summary. Static and dynamic video summarization methods done to football or soccer video type.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Novel Dynamic S-Box Based on Password Key and Circle Map

     Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm.  It is necessary to make this algorithm more efficient and powerful through

... Show More
Scopus (1)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of Educational And Psychological Researches
PROPOSED STANDARDS FOR EVALUATING THE EDUCATIONAL VIDEO ON THE SOCIAL MEDIA

In the spreading of the Internet, mobile smart devices, and interactive websites such as YouTube, the educational video becomes more widespread and deliberative among users. The reasons for its spread are the prevalence of technologies, cheap cost, and easy to use. However, these products often lack to the distinction in video production. By following videos of an educational channel on YouTube, some comments found to discuss the lack of the content presented to motivate the learners, which lead to reduce the viewers of the videos. Therefore, there is an important decision to find general standards for the design and production of educational videos. A list of standards has been drawn up to help those interested in producing educational

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Educational And Psychological Researches
PROPOSED STANDARDS FOR EVALUATING THE EDUCATIONAL VIDEO ON THE SOCIAL MEDIA

In the spreading of the Internet, mobile smart devices, and interactive websites such as YouTube, the educational video becomes more widespread and deliberative among users. The reasons for its spread are the prevalence of technologies, cheap cost, and easy to use. However, these products often lack to the distinction in video production. By following videos of an educational channel on YouTube, some comments found to discuss the lack of the content presented to motivate the learners, which lead to reduce the viewers of the videos. Therefore, there is an important decision to find general standards for the design and production of educational videos. A list of standards has been drawn up to help those interested in producing educational

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Sat Apr 09 2022
Journal Name
Engineering, Technology & Applied Science Research
Static Shear Strength of a Non-Prismatic Beam with Transverse Openings

In this study, a predicated formula is been proposed to find the shear strength of non-prismatic beams with or without openings. It depends on the contributions of concrete shear strength considering the beam depth variation and existing openings, shear steel reinforcements and defines the critical shear section, the effect of diagonal shear reinforcement, the effect of inclined tensile steel reinforcement, and the compression chord influence. The verification of the proposed formula has been conducted on the experimental test results of 26 non-prismatic beams with or without openings at the same loading conditions. The results reflect that the predicted formula finds the shear capacity of non-prismatic beams with openings, it is co

... Show More
Crossref (7)
Crossref
View Publication Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
Effects of Using Static Methods with Contourlet Transformation on Speech Compression

Compression of speech signal is an essential field in signal processing. Speech compression is very important in today’s world, due to the limited bandwidth transmission and storage capacity. This paper explores a Contourlet transformation based methodology for the compression of the speech signal. In this methodology, the speech signal is analysed using Contourlet transformation coefficients with statistic methods as threshold values, such as Interquartile Filter (IQR), Average Absolute Deviation (AAD), Median Absolute Deviation (MAD) and standard deviation (STD), followed by the application of (Run length encoding) They are exploited for recording speech in different times (5, 30, and 120 seconds). A comparative study of performance

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Engineering
Evaluation The Performance Geodetic of the Receivers Using Static Positioning Technique

Global Navigation Satellite System (GNSS) is considered to be one of the most crucial tools for different applications, i.e. transportation, geographic information systems, mobile satellite communications, and others. Without a doubt, the GNSS has been widely employed for different scientific applications, such as land surveying, mapping, and precise monitoring for huge structures, etc. Thus, an intense competitive has appeared between companies which produce geodetic GNSS hardware devices to meet all the requirements of GNSS communities. This study aims to assess the performance of different GNSS receivers to provide reliable positions. In this study, three different receivers, which are produced by different manufactur

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
Human Dynamic Behavior: Reconstruction Trajectories Using CDRs
Abstract<p>Investigating the human mobility patterns is a highly interesting field in the 21th century, and it takes vast attention from multi-disciplinary scientists in physics, economic, social, computer, engineering…etc. depending on the concept that relates between human mobility patterns and their communications. Hence, the necessity for a rich repository of data has emerged. Therefore, the most powerful solution is the usage of GSM network data, which gives millions of Call Details Records gained from urban regions. However, the available data still have shortcomings, because it gives only the indication of spatio-temporal data at only the moment of mobile communication activities. In th</p> ... Show More
Scopus Crossref
View Publication
Publication Date
Wed Aug 30 2023
Journal Name
Mathematical Modelling Of Engineering Problems
Scopus (1)
Scopus Crossref
View Publication