421 research outputs found

    Data hiding using integer lifting wavelet transform and DNA computing

    Get PDF
    DNA computing widely used in encryption or hiding the data. Many researchers have proposed many developments of encryption and hiding algorithms based on DNA sequence to provide new algorithms. In this paper data hiding using integer lifting wavelet transform based on DNA computing is presented. The transform is applied on blue channel of the cover image. The DNA encoding used to encode the two most significant bits of LL sub-band. The produced DNA sequence used for two purpose, firstly, it use to construct the key for encryption the secret data and secondly to select the pixels in HL, LH, HH sub-bands for hiding in them. Many measurement parameters used to evaluate the performance of the proposed method such PSNR, MSE, and SSIM. The experimental results show high performance with respect to different embedding rate

    Saudi Arabia and its Gulf Co-operation Council neighbours : a study in international boundary management.

    Get PDF
    SIGLEAvailable from British Library Document Supply Centre-DSC:DXN042872 / BLDSC - British Library Document Supply CentreGBUnited Kingdo

    National bibliography in Saudi Arabia, Egypt and Tunisia: an analytical and comparative study with a view to planning a Saudi Arabian national bibliography

    Get PDF
    Saudi Arabia has, in recent years, experienced a remarkable development in publishing, due to the expansion of education, the encouragement of writers and publications by the government, and the Islamic heritage. In this context, a National Bibliography is a vital ingredient in promoting publications and encouraging their wider use. The objective of this study is three-fold: to find a model for National Bibliography in the KSA; to consider this proposal in the context of Arab national bibliographies and in the light of broader international aspects. The method of study involved reading a wide range of works on the subject, including papers and conference documents as well as books. Interviews were conducted with individuals and organisations connected with the subject. Description and analysis of works in Saudi Arabia, Egypt and Tunisia were made according to the following plan: publisher; need and aim; scope of coverage (period, subject, type and number); organisation; bibliographical description; and depository law. Most of the bibliographic works produced in the KSA have been for specific purposes, appearing at different periods and often overlapping. They cannot themselves be regarded as a retrospective national bibliography but could be useful in producing one. Egypt and Tunisia are chosen for study as both have experienced similar problems to the KSA and both have a tradition of regular national bibliography. In both countries, the National Library produces the National Bibliography. Their experiences are considered useful for positive adoption of successful features and avoidance of shortcardngs in setting up a Saudi National Bibliography. In addition, a wider examination of Arab Bibliography and international definitions and practices has been made. Deposition law, as a vital feature of successful bibliography production, has also been considered for the main countries studied and for others. The National Library of Saudi Arabia should be the body to publish the prospective National Bibliography, benefiting fron the examples given above. Recarmendations are made for the administration and working of the New Bibliography

    Lessons Learned Framework for Efficient Delivery of Construction Projects in Saudi Arabia

    Get PDF
    The Kingdom of Saudi Arabia (KSA) has the largest construction market in the gulf region. Nevertheless, the sector faces issues related to inefficiency and ineffectiveness in project delivery. This research aims to explore the impact of current practices across projects lifecycles, and to utilize findings to develop an integrated strategic construction project management framework (ISCPMF) that may pave the way to efficient and effective project implementation. To achieve this objective, the authors have traced the implementation processes of nine projects for data collection. This was based on a deductive approach with preconceived themes. Within-case and cross-case analysis was conducted. The data was complemented by holding three separate focus-group discussions with a total of nineteen participants, and the initial findings were cross-checked with six experts. The deficiencies that surround the pre-construction phase and disconnected activities that are carried out in different timespans represent the first barrier to implement projects successfully. This is coupled with low capacities contractors and non-proactive construction teams that lack a management toolbox to alleviate accumulated issues and control project progress. The unavailability of infrastructure and utilities did not ease construction nor made inspection possible, which led to late occupancy of facilities, waste of resources and failure to deliver the desired benefits effectively. The adoption of ISCPMF will institutionalize and bridge project phases. This may play a vital role in implementing projects efficiently and effectively and building data to benefit future projects. Though the research is limited to higher education facilities, the findings may be generalized to public construction projects

    The impact of design approach and contracting practices on cost and execution period of school buildings

    Get PDF
    More than two million school-age children in Yemen are unable to enroll in education because of a shortage of school buildings. This is one of the reasons the country missed the Millennium Development Goal of achieving Education for all by 2015. The struggle to afford school accommodation will continue, because of the lack of resources and high unit cost. Construction cost as time schedule for an identical school building vary by the implementing agency. This paper aims to study in-depth this multi-dimensional issue to find out the factors that lead to this variation, as well as the reasons for the high unit cost and lengthy periods of construction. To achieve this objective, comprehensive raw data that was resourced from agencies that are assigned to implement the largest part of the construction program along with data collected through questionnaires and semi-structured interviews were utilized. Complete sets of design and contracting documents of representative schools were used for deeper analysis and evaluation. The analysis shows that the employed design approaches lead to large structural elements and consequently to longer implementation period and 30% increase in cost. It also shows that contractors add up to 20% for the client’s procurement procedure, approvals, and payment cycle. Additionally, bidders price risks related to accessibility to building sites, availability of building materials, and how trouble-prone is the region. The findings are of relevance to researchers, education planners, and practitioners as they are of high importance to policy makers and financiers whose main concern is to meet the growing need for school accommodation

    Generating and Validating DSA Private Keys from Online Face Images for Digital Signatures

    Get PDF
    Signing digital documents is attracting more attention in recent years, according to the rapidly growing number of digital documents being exchanged online. The digital signature proves the authenticity of the document and the sender’s approval on the contents of the document. However, storing the private keys of users for digital signing imposes threats toward gaining unauthorized access, which can result in producing false signatures. Thus, in this paper, a novel approach is proposed to extract the private component of the key used to produce the digital signature from online face image. Hence, this private component is never stored in any database, so that, false signatures cannot be produced and the sender’s approval cannot be denied. The proposed method uses a convolutional neural network that is trained using a semi-supervised approach, so that, the values used for the training are extracted based on the predictions of the neural network. To avoid the need for training a complex neural network, the proposed neural network makes use of existing pretrained neural networks, that already have the knowledge about the distinctive features in the faces. The use of the MTCNN for face detection and Facenet for face recognition, in addition to the proposed neural network, to achieved the best performance. The performance of the proposed method is evaluated using the Colored FERET Faces Database Version 2 and has achieved robustness rate of 13.48% and uniqueness of 100%
    • …
    corecore