421 research outputs found
Data hiding using integer lifting wavelet transform and DNA computing
DNA computing widely used in encryption or hiding the data. Many researchers have proposed many developments of encryption and hiding algorithms based on DNA sequence to provide new algorithms. In this paper data hiding using integer lifting wavelet transform based on DNA computing is presented. The transform is applied on blue channel of the cover image. The DNA encoding used to encode the two most significant bits of LL sub-band. The produced DNA sequence used for two purpose, firstly, it use to construct the key for encryption the secret data and secondly to select the pixels in HL, LH, HH sub-bands for hiding in them. Many measurement parameters used to evaluate the performance of the proposed method such PSNR, MSE, and SSIM. The experimental results show high performance with respect to different embedding rate
Saudi Arabia and its Gulf Co-operation Council neighbours : a study in international boundary management.
SIGLEAvailable from British Library Document Supply Centre-DSC:DXN042872 / BLDSC - British Library Document Supply CentreGBUnited Kingdo
National bibliography in Saudi Arabia, Egypt and Tunisia: an analytical and comparative study with a view to planning a Saudi Arabian national bibliography
Saudi Arabia has, in recent years, experienced a remarkable
development in publishing, due to the expansion of education, the
encouragement of writers and publications by the government, and the
Islamic heritage. In this context, a National Bibliography is a vital
ingredient in promoting publications and encouraging their wider use.
The objective of this study is three-fold: to find a model for
National Bibliography in the KSA; to consider this proposal in the
context of Arab national bibliographies and in the light of broader
international aspects.
The method of study involved reading a wide range of works on the
subject, including papers and conference documents as well as books.
Interviews were conducted with individuals and organisations connected
with the subject. Description and analysis of works in Saudi Arabia,
Egypt and Tunisia were made according to the following plan:
publisher; need and aim; scope of coverage (period, subject, type
and number); organisation; bibliographical description; and
depository law.
Most of the bibliographic works produced in the KSA have been for
specific purposes, appearing at different periods and often
overlapping. They cannot themselves be regarded as a retrospective
national bibliography but could be useful in producing one. Egypt and Tunisia are chosen for study as both have experienced
similar problems to the KSA and both have a tradition of regular
national bibliography. In both countries, the National Library
produces the National Bibliography. Their experiences are considered
useful for positive adoption of successful features and avoidance of
shortcardngs in setting up a Saudi National Bibliography.
In addition, a wider examination of Arab Bibliography and
international definitions and practices has been made. Deposition law,
as a vital feature of successful bibliography production, has also
been considered for the main countries studied and for others.
The National Library of Saudi Arabia should be the body to publish the
prospective National Bibliography, benefiting fron the examples given
above. Recarmendations are made for the administration and working of the New Bibliography
Lessons Learned Framework for Efficient Delivery of Construction Projects in Saudi Arabia
The Kingdom of Saudi Arabia (KSA) has the largest construction market in the gulf region. Nevertheless, the sector faces issues related to inefficiency and ineffectiveness in project delivery. This research aims to explore the impact of current practices across projects lifecycles, and to utilize findings to develop an integrated strategic construction project management framework (ISCPMF) that may pave the way to efficient and effective project implementation. To achieve this objective, the authors have traced the implementation processes of nine projects for data collection. This was based on a deductive approach with preconceived themes. Within-case and cross-case analysis was conducted. The data was complemented by holding three separate focus-group discussions with a total of nineteen participants, and the initial findings were cross-checked with six experts. The deficiencies that surround the pre-construction phase and disconnected activities that are carried out in different timespans represent the first barrier to implement projects successfully. This is coupled with low capacities contractors and non-proactive construction teams that lack a management toolbox to alleviate accumulated issues and control project progress. The unavailability of infrastructure and utilities did not ease construction nor made inspection possible, which led to late occupancy of facilities, waste of resources and failure to deliver the desired benefits effectively. The adoption of ISCPMF will institutionalize and bridge project phases. This may play a vital role in implementing projects efficiently and effectively and building data to benefit future projects. Though the research is limited to higher education facilities, the findings may be generalized to public construction projects
The impact of design approach and contracting practices on cost and execution period of school buildings
More than two million school-age children in Yemen are unable to enroll in education because of a shortage of school buildings. This is one of the reasons the country missed the Millennium Development Goal of achieving Education for all by 2015. The struggle to afford school accommodation will continue, because of the lack of resources and high unit cost. Construction cost as time schedule for an identical school building vary by the implementing agency. This paper aims to study in-depth this multi-dimensional issue to find out the factors that lead to this variation, as well as the reasons for the high unit cost and lengthy periods of construction. To achieve this objective, comprehensive raw data that was resourced from agencies that are assigned to implement the largest part of the construction program along with data collected through questionnaires and semi-structured interviews were utilized. Complete sets of design and contracting documents of representative schools were used for deeper analysis and evaluation. The analysis shows that the employed design approaches lead to large structural elements and consequently to longer implementation period and 30% increase in cost. It also shows that contractors add up to 20% for the client’s procurement procedure, approvals, and payment cycle. Additionally, bidders price risks related to accessibility to building sites, availability of building materials, and how trouble-prone is the region. The findings are of relevance to researchers, education planners, and practitioners as they are of high importance to policy makers and financiers whose main concern is to meet the growing need for school accommodation
Generating and Validating DSA Private Keys from Online Face Images for Digital Signatures
Signing digital documents is attracting more attention in recent years, according to the rapidly growing number of digital documents being exchanged online. The digital signature proves the authenticity of the document and the sender’s approval on the contents of the document. However, storing the private keys of users for digital signing imposes threats toward gaining unauthorized access, which can result in producing false signatures. Thus, in this paper, a novel approach is proposed to extract the private component of the key used to produce the digital signature from online face image. Hence, this private component is never stored in any database, so that, false signatures cannot be produced and the sender’s approval cannot be denied. The proposed method uses a convolutional neural network that is trained using a semi-supervised approach, so that, the values used for the training are extracted based on the predictions of the neural network. To avoid the need for training a complex neural network, the proposed neural network makes use of existing pretrained neural networks, that already have the knowledge about the distinctive features in the faces. The use of the MTCNN for face detection and Facenet for face recognition, in addition to the proposed neural network, to achieved the best performance. The performance of the proposed method is evaluated using the Colored FERET Faces Database Version 2 and has achieved robustness rate of 13.48% and uniqueness of 100%
Recommended from our members
Graded possibilistic clustering of non-stationary data streams
YesMultidimensional data streams are a major paradigm in data science. This work focuses on possibilistic clustering algorithms as means to perform clustering of multidimensional streaming data. The proposed approach exploits fuzzy outlier analysis to provide good learning and tracking abilities in both concept shift and concept drift
- …