275 research outputs found

    ISB watermarking embedding: a block based model

    Get PDF
    Many watermarking methods have been developed with different methodological complexity levels. Each of these methods tries to reduce exposure in different attack. In this study, the ISB watermarking method was implemented based on average of block of pixels together in order to improve the watermarking method to be more resistant against attacks than a single pixel. The results show that the quality of the images is suitable for the application of the proposed method, based on any size of block. In additional to that the robustness has been improved by increasing the size of the block for all the attacks, including the geometric transform attacks, although they were not improved when the method was applied based on only one pixel

    Ethical issues in e-learning.

    Get PDF
    E-Iearning is becoming a fast growing sector of higher education. Although there are many advantages of e-Iearning, yet there are some ethical issues related to e-Iearning. This paper provides a general overview of such ethical issues. It also provides some strategies to overcome them

    Recognition techniques for online Arabic handwriting recognition systems

    Get PDF
    Online recognition of Arabic handwritten text has been an on-going research problem for many years. Generally, online text recognition field has been gaining more interest lately due to the increasing popularity of hand-held computers, digital notebooks and advanced cellular phones. However, different techniques have been used to build several online handwritten recognition systems for Arabic text, such as Neural Networks, Hidden Markov Model, Template Matching and others. Most of the researches on online text recognition have divided the recognition system into these three main phases which are preprocessing phase, feature extraction phase and recognition phase which considers as the most important phase and the heart of the whole system. This paper presents and compares techniques that have been used to recognize the Arabic handwriting scripts in online recognition systems. Those techniques attempt to recognize Arabic handwritten words, characters, digits or strokes. The structure and strategy of those reviewed techniques are explained in this article. The strengths and weaknesses of using these techniques will also be discussed

    Web assisted language learning system for enhancing Arabic language learning using cognates

    Get PDF
    This paper aims to study the use of the WWW in the learning and teaching of Arabic as a second language. Moreover, it aims to study the combination of Web Assisted Language Learning (WALL) and cognate (words similar in meaning and pronunciation) transfer for Arabic language. In addition, the main goal of this paper is to enhance learning of the Arabic language with the approach of WALL. Therefore, the authors built an Arabic WALL system that automatically identifies cognates in Arabic and any other language. The WALL system displays the cognates in a list and as lessons. However, for evaluating the system, Malay language was chosen to be stored in the database. To evaluate the system, a quantitative method was used in the study. A survey was conducted among two groups of respondents. The respondents of the first group were five (5) Malay-speaking learners. The respondents of the second group were five (5) teachers who teach Arabic to Malaysian students. The questionnaire consisted of 14 closed questions (five-point Likert scale). It was found that the majority of participants were satisfied using the system and that they preferred it over traditional learning. They also found the system to be an effective learning tool. Overall, the findings showed that the goals of the study had been achieved

    Improving knowledge extraction of Hadith classifier using decision tree algorithm

    Get PDF
    Decision tree algorithms have the ability to deal with missing values. While this ability is considered to be advantage, the extreme effort which is required to achieve it is considered a drawback. With the missing values the correct branch could be missed. Therefore, enhanced mechanisms must be employed to handle these values. Moreover, ignoring these null values may cause critical decision to user. Especially for the cases that belong to religion. The present study proposed Hadith classifier which is a method to classify such Hadith into four major classes Sahih, Hasan, Da'ef and Maudo' according to the status of its Isnad ( narrators chain ). This research provided a novel mechanism to deal with missing data in Hadith database. The experiment applied C4.5 algorithm to extract the rules of classification. The findings showed that the accurate rate of the naรฏvebyes classifier has been improved by the proposed approach with 46.54%. Meanwhile, DT classifier had achieved 0.9% better than naรฏvebyes classifier

    Image recognition technique of road tax sticker in Malaysia

    Get PDF
    Plate Recognition became significant in daily life because of the unlimited increase of transportation systems which make it impossible to be fully managed and monitored by humans, examples are so many like traffic monitoring, tracking stolen cars, managing parking toll, red-light violation enforcement, border, toll gates and customs check points. This paper will propose a new image recognition technique for inspecting the validity of car Road Tax information in Malaysia based on Neural Network. The development of vehicle Road Tax Recognition (RTR) System will result in greater efficiency for vehicle monitoring system at Toll Gates in Malaysia. In Malaysia, the usage of recognition system is limited to the vehicle plates. It means that the system is unable to detect Road Tax stickers. Therefore, The Implementing of the Image Recognition of The Road Tax and Monitoring the License Plate Number Identification system helps to automatically detect the Road Tax sticker information and plate number. Previously, the police used to observe the expiry date of the Road Tax sticker and matched it with the car plate number manually. So this paper aimed to propose a technique to monitor the vehicle by automatically capturing and extracting the Road Tax sticker image

    Multimedia elements and internet

    Get PDF
    With the fast improvement In Internet speed and the high technology in various devices, applying multimedia elements became so easy and important in daily life use in different areas in business and general uses. However applying multimedia elements improves the human interaction with devices through internet and improves also worldwide communications anywhere anytime

    A novel digital watermarking technique based on ISB (Intermediate Significant Bit)

    Get PDF
    Least Significant Bit (LSB) technique is the earliest developed technique in watermarking and it is also the most simple, direct and common technique. It essentially involves embedding the watermark by replacing the least significant bit of the image data with a bit of the watermark data. The disadvantage of LSB is that it is not robust against attacks. In this study intermediate significant bit (ISB) has been used in order to improve the robustness of the watermarking system. The aim of this model is to replace the watermarked image pixels by new pixels that can protect the watermark data against attacks and at the same time keeping the new pixels very close to the original pixels in order to protect the quality of watermarked image. The technique is based on testing the value of the watermark pixel according to the range of each bit-plane

    The effect of external factors on the students' acceptance of virtual learning.

    Get PDF
    The rapidly growing popularity of E-Learning has introduced new terms to education, as virtual learning. The success of a virtual learning environment (VLE) depends on a considerable extent of student acceptance and use of such an e-Iearning system. The current study introduces an overview of the Technology Acceptance Model (TAM). Furthermore, it builds a conceptual model to explain the differences between individual students in the level of acceptance and use of a VLE. This model is an extension of TAM. The primary findings of the study show that perceived of peer encouragement (PPE) has direct influence on the students' attitude to use virtual learning. Computer self-efficacy (CSE) and enjoyment (EN) have direct effect on the students' intention to use virtual learning, whilst, the cultural factor (CF) has indirect effects mediated by TAM
    • โ€ฆ
    corecore