Preferred Language
Articles
/
jcoeduw-1432
Digital Citizenship and its Relationship to the Level of Health Awareness of Corona Virus (Covid-19) among a Sample of Palestinian University Students: محمود عبد المجيد عساف
...Show More Authors

The study aims to identify the degree of appreciation for the level of digital citizenship of a sample of Palestinian university students in the governorates of Gaza, and its relationship to the level of health awareness about the emerging coronavirus (covid-19). To achieve the objectives of the study, the researcher followed a descriptive approach by applying two questionnaires; the first, which consists of 30 items, was used  to measure the level of digital citizenship.  The second, which consists of 19 items, was used to measure the level of health awareness. Both questionnaires  were applied on a sample of 367 students who were electronically selected using the manner simple randomness. Results have shown that the degree of appreciation for the level of digital citizenship was high with a relative weight of 76.08%. Besides, the level of health awareness of coronavirus was high with a relative weight of 81.83%. Additionally, it has been found that there is a direct relationship with a statistical significance between the degree of sample appreciation of the level of digital citizenship, and the degree of  its evaluation of the level of health awareness of coronavirus, where the correlation coefficient was 0.468. Moreover, there has been shown that there are no statistically significant differences between the mean scores of the individuals appreciation of the level of health awareness of coronavirus (Covid-19) due to the gender variable. That is; the level of digital citizenship was in favor of females.The study recommended that e-university platforms should include health awareness messages for preventive purposes

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Adaptive Medical Image Watermarking Technique based on Wavelet Transform
...Show More Authors

In this paper, an adaptive medical image watermarking technique is proposed based on wavelet transform and properties of human visual system in order to maintain the authentication of medical images. Watermark embedding process is carried out by transforming the medical image into wavelet domain and then adaptive thresholding is computed to determine the suitable locations to hide the watermark in the image coefficients. The watermark data is embedded in the coefficients that are less sensitive into the human visual system in order to achieve the fidelity of medical image. Experimental results show that the degradation by embedding the watermark is too small to be visualized. Also, the proposed adaptive watermarking technique can preserv

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Computers, Materials & Continua
Improving Video Watermarking through Galois Field <i>GF</i>(2<sup>4</sup>) Multiplication Tables with Diverse Irreducible Polynomials and Adaptive Techniques
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Effective Image Watermarking Method Based on DCT
...Show More Authors

Most includeding techniques of digital watermark even now working through the direct inclusion in the pixel without taking into account the level of compression (attack) that can go wrong, which makes digital watermark can be discarded easily. In this research, a method was proposed to overcome this problem, which is based on DCT (after image partitioned into non overlapped blocks with size 8×8 pixel), accompanied by a quantization method. The watermark (digital image) is embedded in DCT frequency domain seeking the blocks have highest standard deviation (the checking is only on the AC coefficients) within a predetermined threshold value, then the covered image will compressed (attacked) varying degrees of compression. The suggested met

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
القیم الاجتماعیة السائدة عند تلامذة الصف الاول الابتدائي
...Show More Authors

The research aims at:
1 - Detection of the degree of social values (truthfulness, honesty, cooperation) of the
primary first class students who compose members of the research sample in general.
2 - Are there significant differences at the level (0,05%) between the average degree of
members of the research sample in the values (truthfulness, honesty, cooperation) among
students enrolled and not enrolled in kindergarten and in general.
3 - Are there significant differences at the level (0,05%) between the mean scores of
individuals in the sample values (truthfulness, honesty, cooperation) in the light of two
variables: A - Gender (male / female), b - enrolled and not enrolled in kindergarten.
Having in mind that

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 27 2019
Journal Name
Iraqi Journal Of Science
Watermarking in 3D Models Using Depth Path
...Show More Authors

This paper presents a 3D watermarking model based on the nearest distance between two vertices in mesh, where the embedding path moves as deep as possible until the embedding data is completed. The proposed algorithm achieved good results according to invisibility and robustness. The visibility was measured in term
of Root Mean Square Error (RMSE) and Hausdroff Distance (HD), which obtained good results. As related to robustness, the proposed method showed resistance to geometrical attack (translation, scaling and rotation) as well as acceptable resistance to signal processing attacks like noise addition and simplification.

View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Robust Watermarking Scheme for GIS Vector Maps
...Show More Authors

  With the fast progress of information technology and the computer networks, it becomes very easy to reproduce and share the geospatial data due to its digital styles. Therefore, the usage of geospatial data suffers from various problems such as data authentication, ownership proffering, and illegal copying ,etc. These problems can represent the big challenge to future uses of the geospatial data. This paper introduces a new watermarking scheme to ensure the copyright protection of the digital vector map. The main idea of proposed scheme is based on transforming  the digital map to frequently domain using the Singular Value Decomposition (SVD) in order to determine suitable areas to insert the watermark data.

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Copy Move Forgery Detection Using Forensic Images
...Show More Authors

     Digital images are open to several manipulations and dropped cost of compact  cameras and mobile phones due to the robust image editing tools. Image credibility is therefore become doubtful, particularly where photos have power, for instance, news reports and insurance claims in a criminal court. Images forensic methods therefore measure the integrity of image  by apply different highly technical methods established in literatures. The present work deals with copy move forgery images of Media Integration and Communication Center Forgery (MICC-F2000) dataset for detecting and revealing the areas that have been tampered portion in the image, the image is sectioned into non overlapping blocks using Simple

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Mon Mar 28 2022
Journal Name
Modern Sport
الدافعية العقلية وعلاقتها باكتساب بعض مفاهيم السلامة المرورية لتلاميذ الصف الخامس الابتدائي
...Show More Authors

هدفت الدراسة إلى استخدام مقاييس الدافعية العقلية وعلاقتها باكتساب بعض مفاهيم السلامة المرورية لتلاميذ الصف الخامس الابتدائي , واستخدمت الباحثتان المنهج الوصفي بأسلوبي المسح والعلاقات الارتباطية لملاءمته لطبيعة البحث , إذ تكونت عينة الدراسة من (75) تلميذ وتلميذه من تلاميذ مدرسة فدك الابتدائية الأهلية , إذ قامت الباحثتان بأستخدام مقياس الدافعية العقلية والمكون من (25) فقرة  وأختبار تنمية بعض مفاهيم السلام

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Image Encryption Based on Intelligent Session Mask Keys
...Show More Authors

The revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC

... Show More
View Publication Preview PDF