Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 17 )

2018 ( 24 )

2017 ( 15 )

2016 ( 23 )

Custom range...

Search Results: 1 - 10 of 1224 matches for " Adel Hammad Abusitta "
All listed articles are free for downloading (OA Articles)
Page 1 /1224
Display every page Item
A Visual Cryptography Based Digital Image Copyright Protection  [PDF]
Adel Hammad Abusitta
Journal of Information Security (JIS) , 2012, DOI: 10.4236/jis.2012.32012
Abstract: A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels. The new method proposed does not require that the watermark pattern to be embedded in to the original digital image. Instead of that, verification information is generated which will be used to verify the ownership of the image. This leaves the marked image equal to the original image. The method is based on the relationship between randomly selected pixels and their 8-neighbors’ pixels. This relationship keeps the marked image coherent against diverse attacks even if the most significant bits of randomly selected pixels have been changed by attacker as we will see later in this paper. Experimental results show the proposed method can recover the watermark pattern from the marked image even if major changes are made to the original digital image.
A Water-Saving Technique Using Embedded System  [PDF]
Ibrahim Mohammed Bader, Adel Hammad Abusitta
Applied Mathematics (AM) , 2013, DOI: 10.4236/am.2013.41021

A method for water-saving is presented in this paper. The proposed method is based on an electro mechanical approach and embedded system that is described mathematically. It describes a solution for water-saving in buildings by giving the ability to ensure that treasurer of water will never be empty before the maximum time T that the owner gives to the treasurer when it is filled with water. The rate of water pumped is altered based on water consumed at tr. Where tr is a random number generated by system. Simulation results in the last section shows that the method can save the water with different maximum time decided by the owner.

A Visual Cryptography Based Watermark Technology for Individual and Group Images
Azzam Sleit,Adel Abusitta
Journal of Systemics, Cybernetics and Informatics , 2007,
Abstract: The ease by which digital information can be duplicated and distributed has led to the need for effective copyright protection tools. Various techniques including watermarking have been introduced in attempt to address these growing concerns. Most watermarking algorithms call for a piece of information to be hidden directly in media content, in such a way that it is imperceptible to a human observer, but detectable by a computer. This paper presents an improved cryptographic watermark method based on Hwang and Naor-Shamir [1, 2] approaches. The technique does not require that the watermark pattern to be embedded in to the original digital image. Verification information is generated and used to validate the ownership of the image or a group of images. The watermark pattern can be any bitmap image. Experimental results show that the proposed method can recover the watermark pattern from the marked image (or group of images) even if major changes are reflected on the original digital image or any member of the image group such as rotation, scaling and distortion.
An Efficient Pattern Matching Algorithm
Azzam Sleit,Wesam AlMobaideen,Aladdin H. Baarah,Adel H. Abusitta
Journal of Applied Sciences , 2007,
Abstract: In this study, we present an efficient algorithm for pattern matching based on the combination of hashing and search trees. The proposed solution is classified as an offline algorithm. Although, this study demonstrates the merits of the technique for text matching, it can be utilized for various forms of digital data including images, audio and video. The performance superiority of the proposed solution is validated analytically and experimentally.
Knowledge Discovery in Data: A Case Study  [PDF]
Ahmed Hammad, Simaan AbouRizk
Journal of Computer and Communications (JCC) , 2014, DOI: 10.4236/jcc.2014.25001

It is common in industrial construction projects for data to be collected and discarded without being analyzed to extract useful knowledge. A proposed integrated methodology based on a five-step Knowledge Discovery in Data (KDD) model was developed to address this issue. The framework transfers existing multidimensional historical data from completed projects into useful knowledge for future projects. The model starts by understanding the problem domain, industrial construction projects. The second step is analyzing the problem data and its multiple dimensions. The target dataset is the labour resources data generated while managing industrial construction projects. The next step is developing the data collection model and prototype data ware-house. The data warehouse stores collected data in a ready-for-mining format and produces dynamic On Line Analytical Processing (OLAP) reports and graphs. Data was collected from a large western-Canadian structural steel fabricator to prove the applicability of the developed methodology. The proposed framework was applied to three different case studies to validate the applicability of the developed framework to real projects data.

Feasibility of Protection Zones for Water Resources in Arid Areas: Case Study; Duyuk Nueimah Shosa Springs, Jericho, Palestine  [PDF]
Marwan Ghanem, Mahmoud Hammad
Journal of Environmental Protection (JEP) , 2015, DOI: 10.4236/jep.2015.62013
Abstract: Urbanization and different human-economic activities put increasing pressure on the ground water quality, which is considered as the main drinking water resources in Palestine. Protecting the spring water resources in Palestine is one major issue for the continuity of the availability of the water resources. An economic feasibility study was conducted for the Nuewimah-Shosha-Dyuk spring system in order to assess the economical factor for the induced methodology of the protection zones. The spring system has multiple users from different sectors (i.e., domestic, agriculture, commercial and public use) and multi-year cost benefit analysis technique used to show the feasibility of water protection zones on the long run. The study shows that even in arid areas in Palestine, small quantities are derived from springs-implementation of water protection zones is still feasible; the results of this study emphasize on importance and feasibility of water resources protection zones.
Orofacial findings in chronic granulomatous disease: report of twelve patients and review of the literature
Najla S Dar-Odeh, Wail A Hayajneh, Osama A Abu-Hammad, Huda M Hammad, Adel M Al-Wahadneh, Najwa K Bulos, Azmi M Mahafzah, Maha S Shomaf, Mohammed A El-Maaytah, Faris G Bakri
BMC Research Notes , 2010, DOI: 10.1186/1756-0500-3-37
Abstract: The age range was 5-31 years. Oral findings were variable, and reflected a low level of oral hygiene. They included periodontitis, rampant caries, gingivitis, aphthous-like ulcers, and geographic tongue. One patient had white patches on the buccal mucosa similar to lichen planus. Another patient had a nodular dorsum of the tongue associated with fissured and geographic tongue. Biopsies from the latter two lesions revealed chronic non-specific mucositis. Panoramic radiographs showed extensive periodontitis in one patient and periapical lesions in another patient.Patients with chronic granulomatous disease may develop oral lesions reflecting susceptibility to infections and inflammation. It is also possible that social and genetic factors may influence the development of this complication. Therefore, oral hygiene must be kept at an optimum level to prevent infections that can be difficult to manage.Chronic granulomatous disease (CGD) is an extremely rare congenital immune deficiency syndrome with an incidence of 1:250,000 individuals. It is characterized by recurrent severe infections due to the inability of neutrophils and macrophages to mount a respiratory burst and kill invading bacteria and fungi. The disease is caused by nicotinamide adenine dinucleotide phosphate (NADPH) oxidase deficiency which results from mutation in one of the four components of the NADPH oxidase complex. The most frequent form is the X linked (XCGD), with mutations in CYBB gene encoding gp91phox subunit. Rare subgroups are caused by mutations in CYBA, NCF1 or NCF2 genes encoding p22phox, p47phox or p67phox subunits respectively [1,2]CGD patients usually present in the first few years of life with cervical or inguinal lymphadenitis, liver abscesses, osteomyelitis, pneumonia, or skin infections [1,2]. In addition, CGD patients also suffer from infections and sterile hyperinflammation in the oral cavity [3]In CGD, oral complications are generally considered to be minor infections as they are n
Analyticity of Semigroups generated by Degenerate Mixed Differential Operators  [PDF]
Adel Saddi
Advances in Pure Mathematics (APM) , 2011, DOI: 10.4236/apm.2011.13010
Abstract: In this paper we are interested in studying the dissipativity of degenerate mixed differential operators involving an interface point. We show that, under particular interface conditions, such operators generate analytic semigroups on an appropriate Hilbert space . To illustrate the results an example is discussed.
Mild Solutions of Fractional Semilinear Integro-Differential Equations on an Unbounded Interval  [PDF]
Adel Jawahdou
Applied Mathematics (AM) , 2013, DOI: 10.4236/am.2013.47A007
Abstract: In this paper, we study the existence of mild solutions for fractional semilinear integro-differential equations in an arbitrary Banach space associated with operators generating compact semigroup on the Banach space. The arguments are based on the Schauder fixed point theorem.
A Decision Tree Classifier for Intrusion Detection Priority Tagging  [PDF]
Adel Ammar
Journal of Computer and Communications (JCC) , 2015, DOI: 10.4236/jcc.2015.34006
Abstract: Snort rule-checking is one of the most popular forms of Network Intrusion Detection Systems (NIDS). In this article, we show that Snort priorities of true positive traffic (real attacks) can be approximated in real-time, in the context of high speed networks, by a decision tree classifier, using the information of only three easily extracted features (protocol, source port, and destination port), with an accuracy of 99%. Snort issues alert priorities based on its own default set of attack classes (34 classes) that are used by the default set of rules it provides. But the decision tree model is able to predict the priorities without using this default classification. The obtained tagger can provide a useful complement to an anomaly detection intrusion detection system.
Page 1 /1224
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.