1,717 research outputs found

    ISB watermarking embedding: a block based model

    Get PDF
    Many watermarking methods have been developed with different methodological complexity levels. Each of these methods tries to reduce exposure in different attack. In this study, the ISB watermarking method was implemented based on average of block of pixels together in order to improve the watermarking method to be more resistant against attacks than a single pixel. The results show that the quality of the images is suitable for the application of the proposed method, based on any size of block. In additional to that the robustness has been improved by increasing the size of the block for all the attacks, including the geometric transform attacks, although they were not improved when the method was applied based on only one pixel

    Recognition techniques for online Arabic handwriting recognition systems

    Get PDF
    Online recognition of Arabic handwritten text has been an on-going research problem for many years. Generally, online text recognition field has been gaining more interest lately due to the increasing popularity of hand-held computers, digital notebooks and advanced cellular phones. However, different techniques have been used to build several online handwritten recognition systems for Arabic text, such as Neural Networks, Hidden Markov Model, Template Matching and others. Most of the researches on online text recognition have divided the recognition system into these three main phases which are preprocessing phase, feature extraction phase and recognition phase which considers as the most important phase and the heart of the whole system. This paper presents and compares techniques that have been used to recognize the Arabic handwriting scripts in online recognition systems. Those techniques attempt to recognize Arabic handwritten words, characters, digits or strokes. The structure and strategy of those reviewed techniques are explained in this article. The strengths and weaknesses of using these techniques will also be discussed

    Ethical issues in e-learning.

    Get PDF
    E-Iearning is becoming a fast growing sector of higher education. Although there are many advantages of e-Iearning, yet there are some ethical issues related to e-Iearning. This paper provides a general overview of such ethical issues. It also provides some strategies to overcome them

    Improving knowledge extraction of Hadith classifier using decision tree algorithm

    Get PDF
    Decision tree algorithms have the ability to deal with missing values. While this ability is considered to be advantage, the extreme effort which is required to achieve it is considered a drawback. With the missing values the correct branch could be missed. Therefore, enhanced mechanisms must be employed to handle these values. Moreover, ignoring these null values may cause critical decision to user. Especially for the cases that belong to religion. The present study proposed Hadith classifier which is a method to classify such Hadith into four major classes Sahih, Hasan, Da'ef and Maudo' according to the status of its Isnad ( narrators chain ). This research provided a novel mechanism to deal with missing data in Hadith database. The experiment applied C4.5 algorithm to extract the rules of classification. The findings showed that the accurate rate of the naïvebyes classifier has been improved by the proposed approach with 46.54%. Meanwhile, DT classifier had achieved 0.9% better than naïvebyes classifier

    Kabristan kartpostalları

    Get PDF
    Taha Toros Arşivi, Dosya No: 136-Kartpostallarİstanbul Kalkınma Ajansı (TR10/14/YEN/0033) İstanbul Development Agency (TR10/14/YEN/0033

    Turgut Oğulları, Eserleri - Vakfiyeleri

    Get PDF
    [No Abstract Available
    corecore