6 research outputs found

    An improved digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit

    Get PDF
    Software watermarking is one of the most important methods for protecting copyrights and authenticating ownership; which can be used to prevent software piracy. In order to provide high quality watermarked image, the watermarked image should be imperceptible. Least significant bit (LSB) is a technique that has been used for digital watermarking. Many researchers have improved LSB to embed watermark in the image. In this thesis, we introduce an improved digital watermarking algorithm using least significant bit (LSB). This method is chosen due to its minimal effect on the image. LSB is used by inversing the binary values of the watermark text and shifting the watermark according to the odd or even number of pixel coordinates of image before embedding the watermark. The proposed algorithm can be personalized according to the length of the watermark text. If the length of the watermark text is more than ((M*N)/8)-2 (where M*N is the amount of pixels in the image), the proposed algorithm will also embed the extra of the watermark text in the second LSB. We compare our proposed algorithm with the 1-LSB algorithm and Lee’s algorithm and Yang's algorithm using Peak signal�to-noise ratio (PSNR). The value of the watermarked dock image is 54.5691 dB which is higher than the traditional LSB 53.6950 dB and Lee's algorithm 53.7041 db and Yang's algorithm 52.4518 dB. Also in the other image, the proposed algorithm got the highest value of PSNR. This improved algorithm improved its quality of the watermarked image. We also attack the watermarked image by using cropping and adding noise and we got good results as wel

    A New Digital Watermarking Algorithm Using Combination of Least Significant Bit (LSB) and Inverse Bit

    Full text link
    In this paper, we introduce a new digital watermarking algorithm using least significant bit (LSB). LSB is used because of its little effect on the image. This new algorithm is using LSB by inversing the binary values of the watermark text and shifting the watermark according to the odd or even number of pixel coordinates of image before embedding the watermark. The proposed algorithm is flexible depending on the length of the watermark text. If the length of the watermark text is more than ((MxN)/8)-2 the proposed algorithm will also embed the extra of the watermark text in the second LSB. We compare our proposed algorithm with the 1-LSB algorithm and Lee's algorithm using Peak signal-to-noise ratio (PSNR). This new algorithm improved its quality of the watermarked image. We also attack the watermarked image by using cropping and adding noise and we got good results as well.Comment: 8 pages, 6 figures and 4 tables; Journal of Computing, Volume 3, Issue 4, April 2011, ISSN 2151-961

    The Effects of Partial Replacement of Fish-Meal with Mesquite Pods on Growth Parameters of Tilapia Fry, Oreochromis mossambicus

    Get PDF
    This study was carried out to determine the effect of partial replacement of fish-meal with 15%, 30% and 45% of Mesquite pods (MP) in testing diets on growth parameters of Tilapia fries, Oreochromis mossambicus which reared in glass aquarium for 12 weeks. Twenty O. mossambicus fries (Mean initial weight 3.33 g) were randomly distributed into each 12 glass aquariums (measuring 50 x 50 x 50 cm) filled with tap water to 40 cm depth. Four treatments were formulated in this experiment. The first treatment was controlled and three testing diets contain 15%, 30% and 45% of MP. The results showed that the replacement of fish meal with Mesquite pods significantly reduced all growth parameters such as final weight, weight gain, food conversion ratio, specific growth rate, relative growth rate and protein efficiency ratio and survival of Tilapia fries Oreochromis mossambicus compared with control (without Mesquite pods) . The highest final performance weight of 67.33g was obtained in fish fed on the control diet and the lowest weight was 44.53g with fish fed on 45% MP in the testing diet. Also when using Mesquite pods as partial replacement of fish meal observed significantly elevated in all proximate composition of fish such as lipid, fiber and ash, except protein. From these results, it can be concluded that fish fed on testing diets had the acceptable growth performance when fish-meal was replaced with 15%, 30% and 45% of MP in testing diets

    The study of production performance of water heater manufacturing by using simulation method

    Get PDF
    In industrial companies, as demand increases, decision-making to increase production becomes difficult due to the complexity of the model systems. Companies are trying to find the optimum methods to tackle such problems so that resources are utilized and production is increased. One line system of a manufacturing company in Malaysia was considered in this research. The Company produces several types of water heater and each type went into many processes, which was divided into twenty six sections. Each section has several operations. The main type of the product was 10G water heater which is produced most compare to other types, hence it was taken under consideration to be studied in this research. It was difficult to find the critical section that could improve the productions of the company. This research paper employed Delmia Quest software, Distribution Analyser software and Design of Experiment (DOE software) to simulate one model system taken from the company to be studied and to find the critical section that will improve the production system. As a result, assembly of inner and outer tank section were found to be the bottleneck section. Adding one section to the bottleneck increases the production rate by four products a day. The buffer size is determined by the experiment was six items

    Improving Accurate Candidates for Missing Data Using Benefit Performance of (ML-SOM)

    Get PDF
    Missing data is one of the major challenges in extracting and analyzing knowledge from datasets. The performance of training quality was affected by the appearance of missing data in a dataset. For this reason, there is a need for a quick and reliable method to find possible solutions in order to provide an accurate system. Therefore, the previous studies provided robust ability of Self Organizing Map (SOM) algorithm to deal with the missing values [6, 20]. However, it has a drawback such as an error rate(ERR) in the missing values that increase huge dataset. This study is mainly based on the projection of unsupervised Multilayer SOM (ML-SOM) for missing values. The global methodology presented the combination of advantages of the proposed ML-SOM to obtain a precise method with various missing rates: 5%, 10% and 20%. The experiments were conducted by adopting two types of commonly used data benchmarks (IRIS and BreastCancer) from Weka 3.9 machine learning tool. The new proposed method ML-SOM provides a minimum Error Rate (ERR) and high accuracy (ACC)in small and large datasets compared to other standard classifier types (Bayes-Net, Kmeans and SOM)

    Pressure based routing protocol for underwater wireless sensor networks: a survey

    No full text
    Underwater wireless sensor networks (UWSNs) are similar to the terrestrial sensor networks. Nevertheless, there are different characteristics among them such as low battery power, limited bandwidth and high variable propagation delay. One of the common major problems in UWSNs is determining an efficient and reliable routing between the source node and the destination node. Therefore, researchers tend to design efficient protocols with consideration of the different characteristics of underwater communication. Furthermore, many routing protocols have been proposed and these protocols may be classified as location-based and location-free routing protocols. Pressure-based routing protocols are a subcategory of the location-free routing protocols. This paper focuses on reviewing the pressure-based routing protocols that may further be classified into non-void avoidance protocols and void avoidance protocols. Moreover, non-void avoidance protocols have been classified into single factor based and multi factor based routing protocols. Finally, this paper provides a comparison between these protocols based on their features, performance and simulation parameters and the paper concludes with some future works on which further study can be conducted
    corecore