Learn More
In image watermarking, information is embedded into cover media to prove ownership. Various watermarking techniques have been proposed by many authors in the last several years which include spatial domain and transform domain watermarking. Wavelet based image watermarking is gaining more popularity because of its resemblance with the human visual
Intrusion detection system (IDS) is an important tool for the defense of a network against attacks. It monitors the activities occurring in a computer system or network and analyzes them for recognizing intrusions to protect the computer network. Most of the existing IDSs use all of the 41 features available in the network packet to analyze and look for(More)
An efficient brain segmentation technique of magnetic resonance image (MRI) is proposed for the sake of atrophy detection. Early detection of brain atrophy indicates many neurodiseases. The paper also proposes a new simple assessment for brain atrophy as an atrophy ratio measure. Experiments on cognitive normal and atrophied MRI Brain images demonstrate the(More)
This study was undertaken to examine the possible clinical advantages of using muscle relaxant with intravenous regional anaesthesia, (IVRA). Forty unpremedicated adult patients undergoing hand surgery were randomly allocated to receive either 40 ml 0.5% lidocaine or 40 ml 0.5% lidocaine with 2 mg of atracurium. The atracurium group of patients had a(More)
Singular value decomposition (SVD) is robust and reliable orthogonal matrix decomposition. Due to its conceptual and stability properties, it is becoming more and more popular in signal processing area especially in watermarking. Many watermarking and data hiding researches has struck the use of singular values in casting hidden information into the hosted(More)
In Wireless Sensor Networks (WSN) with a clustered hierarchical structure, Cluster-Head (CH) nodes are considered the interface between the leaf normal sensors and the Base Station (BS). The energy dissipation of the sensors, whatever their type, can be optimized by a load balancing in the packet TX/RX process in order to prolong the network lifetime and(More)