275 research outputs found
ISB watermarking embedding: a block based model
Many watermarking methods have been developed with different methodological complexity levels. Each of these methods tries to reduce exposure in different attack. In this study, the ISB watermarking method was implemented based on average of block of pixels together in order to improve the watermarking method to be more resistant against attacks than a single pixel. The results show that the quality of the images is suitable for the application of the proposed method, based on any size of block. In additional to that the robustness has been improved by increasing the size of the block for all the attacks, including the geometric transform attacks, although they were not improved when the method was applied based on only one pixel
Ethical issues in e-learning.
E-Iearning is becoming a fast growing sector of higher education. Although there are many advantages of e-Iearning, yet there are some ethical issues related to e-Iearning. This paper provides a general overview of such ethical issues. It also provides some strategies to overcome them
Recognition techniques for online Arabic handwriting recognition systems
Online recognition of Arabic handwritten text has been an on-going research problem for many years. Generally,
online text recognition field has been gaining more interest
lately due to the increasing popularity of hand-held computers, digital notebooks and advanced cellular phones. However, different techniques have been used to build several online handwritten recognition systems for Arabic text, such as Neural Networks, Hidden Markov Model, Template Matching and others. Most of the researches on online text recognition have divided the recognition system into these three main phases which are preprocessing phase, feature extraction phase and recognition phase which considers as the most important phase and the heart of the whole system. This paper presents and compares techniques that have been used to recognize the Arabic handwriting scripts in online recognition systems. Those techniques attempt to recognize Arabic handwritten words, characters, digits or strokes. The structure and strategy of those reviewed techniques are explained in this article. The strengths and weaknesses of using these techniques will also be discussed
Web assisted language learning system for enhancing Arabic language learning using cognates
This paper aims to study the use of the WWW in the learning and teaching of Arabic as a second language. Moreover, it aims to study the combination of Web Assisted Language Learning (WALL) and cognate (words similar in meaning and pronunciation) transfer for Arabic language. In addition, the main goal of this paper is to enhance learning of the Arabic language with the approach of WALL. Therefore, the authors built an Arabic WALL system that automatically identifies cognates in Arabic and any other language. The WALL system displays the cognates in a list and as lessons. However, for evaluating the system, Malay language was chosen to be stored in the database. To evaluate the system, a quantitative method was used in the study. A survey was conducted among two groups of respondents. The respondents of the first group were five (5) Malay-speaking learners. The respondents of the second group were five (5) teachers who teach Arabic to Malaysian students. The questionnaire consisted of 14 closed questions (five-point Likert scale). It was found that the majority of participants were satisfied using the system and that they preferred it over traditional learning. They also found the system to be an effective learning tool. Overall, the findings showed that the goals of the study had been achieved
Improving knowledge extraction of Hadith classifier using decision tree algorithm
Decision tree algorithms have the ability to deal with missing values. While this ability is considered to be advantage, the extreme effort which is required to achieve it is considered a drawback. With the missing values the correct branch could be missed. Therefore, enhanced mechanisms must be employed to handle these values. Moreover, ignoring these null values may cause critical decision to user. Especially for the cases that belong to religion. The present study proposed Hadith classifier which is a method to classify such Hadith into four major classes Sahih, Hasan, Da'ef and Maudo' according to the status of its Isnad ( narrators chain ). This research provided a novel mechanism to deal with missing data in Hadith database. The experiment applied C4.5 algorithm to extract the rules of classification. The findings showed that the accurate rate of the naรฏvebyes classifier has been improved by the proposed approach with 46.54%. Meanwhile, DT classifier had achieved 0.9% better than naรฏvebyes classifier
Image recognition technique of road tax sticker in Malaysia
Plate Recognition became significant in daily life
because of the unlimited increase of transportation systems
which make it impossible to be fully managed and monitored
by humans, examples are so many like traffic monitoring,
tracking stolen cars, managing parking toll, red-light
violation enforcement, border, toll gates and customs check
points. This paper will propose a new image recognition
technique for inspecting the validity of car Road Tax
information in Malaysia based on Neural Network. The
development of vehicle Road Tax Recognition (RTR) System
will result in greater efficiency for vehicle monitoring system at Toll Gates in Malaysia. In Malaysia, the usage of
recognition system is limited to the vehicle plates. It means that the system is unable to detect Road Tax stickers.
Therefore, The Implementing of the Image Recognition of
The Road Tax and Monitoring the License Plate Number
Identification system helps to automatically detect the Road
Tax sticker information and plate number. Previously, the
police used to observe the expiry date of the Road Tax sticker and matched it with the car plate number manually. So this paper aimed to propose a technique to monitor the vehicle by automatically capturing and extracting the Road Tax sticker image
Multimedia elements and internet
With the fast improvement In Internet speed and the high technology in various devices, applying multimedia elements became so easy and important in daily life use in different areas in business and general uses. However applying multimedia elements improves the human interaction with devices through internet and improves also worldwide communications anywhere anytime
A novel digital watermarking technique based on ISB (Intermediate Significant Bit)
Least Significant Bit (LSB) technique is the earliest
developed technique in watermarking and it is also the most simple, direct and common technique. It essentially involves embedding the watermark by replacing the least significant bit of the image data with a bit of the watermark data. The disadvantage of LSB is that it is not
robust against attacks. In this study intermediate significant bit (ISB) has been used in order to improve the robustness of the watermarking system. The aim of this model is to replace the watermarked image pixels by new pixels that can protect the watermark data against
attacks and at the same time keeping the new pixels very close to the original pixels in order to protect the quality of watermarked image. The technique is based on testing the value of the watermark pixel according to the range of each bit-plane
The effect of external factors on the students' acceptance of virtual learning.
The rapidly growing popularity of E-Learning has introduced new terms to education, as virtual learning. The success of a virtual learning environment (VLE) depends on a considerable extent of student acceptance and use of
such an e-Iearning system. The current study introduces an overview of the Technology Acceptance Model (TAM). Furthermore, it builds a conceptual model to explain the differences between individual students in the level of
acceptance and use of a VLE. This model is an extension of TAM. The primary findings of the study show that perceived of peer encouragement (PPE) has direct influence on the students' attitude to use virtual learning. Computer self-efficacy (CSE) and enjoyment (EN) have direct effect on the
students' intention to use virtual learning, whilst, the cultural factor (CF) has indirect effects mediated by TAM
- โฆ