SlideShare a Scribd company logo
1 of 33
Download to read offline
Scientific Research Group in Egypt (SRGE)

Robust Watermarking Approach for 3D Triangular
Mesh using Self Organization Map
By
Mona M.Soliman
Cairo university

Company

LOGO
2013 8th International Conference on Computer Engineering & Systems (ICCES) 26 Nov - 28 Nov
2013
Company

LOGO

Scientific Research Group in Egypt
www.egyptscience.net
Company

LOGO

Agenda
1. Motivations
2. Introduction
3. Objective and problem definition

4. Background
5. Proposed 3D watermarking scheme
6. Experimental Results
7. Conclusions.
Company

LOGO

Motivation

 It is essential to provide a robust technique for copyright protection and/or content
authentication of graphics data in a universal multimedia access framework.
 One approach to meet this requirement is the use of digital watermarking.
 Since 3-D mesh watermarking techniques were introduced, there have been several
attempts to improve the performance in terms of transparency and robustness.
Company

LOGO





Introduction

Watermark robustness is the
ability to recover the watermark
even if the watermarked 3D
model has been manipulated.
Usually, one hopes to construct a
robust watermark which is able to
go through common malicious
attacks for copyright protection
purposes.

There are two kinds of 3D mesh
watermarking algorithms:
Spatial domain based algorithm.
Transformation
domain
based
algorithm.
Company

LOGO


Objective

The objective of this paper is to explore innovative
ways to insert the maximum amount of secret
information into 3D mesh models without causing
perceptual distortion and also make it difficult for
the attacker to guess where the watermark was
inserted.
 Watermark insertion is performed on
specific set of vertices that are selected by
utilizing Self Organization Maps (SOM) .
SOM is a kind of competitive neural network
in which the networks learn to form their
own classifications.
 Two methods were used to embed the
watermark into 3D model.
 (1) statistical approach that modified
the distribution of vertex norms to hide
watermark information into host 3D
model
 (2) mixed insertion of watermark bits
into host model using vertex norm
distribution and mesh vertices at the
same time.
Company

LOGO

Background

4.1 Self Organization Map
4.2 3D Mesh Basics
4.3 Vertex Smoothness Measure
Company

LOGO

Self Organizing Map

 Self-Organizing means no supervision
is required. SOMs learn on their own
through
unsupervised
competitive
learning.
 In competitive learning, the elements of
the network compete with each other for
the right to provide the output
associated with an input vector.
 Only one element is allowed to answer
the
query
and
this
element
simultaneously inhibits all other
competitors.
Company

LOGO

3D mesh Basics

•

Mathematically, a 3D mesh containing N
vertices and M edges can be modelled as a
signal M = G,C.

•

The set of all the neighbours of a vertex vi is
called 1-ring of the vertex.

•

The number of neighbours of vi in it’s 1-ring
neighborhood is the valence or degree of the
vertex vi .
Company

LOGO

3D mesh Basics

•

Mathematically, a 3D mesh
containing N vertices and M edges
can be modelled as a signal M = G,C.

•

The set of all the neighbours of a
vertex vi is called 1-ring of the vertex.

•

The number of neighbours of vi in it’s
1-ring neighborhood is the valence or
degree of the vertex vi .
Company

LOGO

Vertex Smoothness Measure

 The smoothness feature measure
the angle variation between
surface normal and the average
normal corresponding to a vertex.
 smoothness measure reflect the
local geometry of a surface or
region.
 Both flat and peak regions can’t be
used to hide watermark bits. We
have to neglect these regions and
mark their vertices as unsuitable
watermark carrier.
Company

LOGO

Agenda
1. Motivations
2. Introduction
3. Objective and problem definition

4. Background
5. Proposed 3D watermarking scheme
6. Experimental results
7. Conclusions.
Company

LOGO

Proposed 3D watermarking scheme

4.1 Vertex Clustering Based on Self Organization Map
4.2 Watermark Insertion Procedure
4.3 Watermark Extraction Procedure
Company

LOGO

Vertex Clustering Based on SOM

 This performed by using SOM
to cluster the whole mesh
vertices into three clusters
(large, medium, and low), label
the medium clusters’ vertices to
be suitable watermark carriers.
 We train four SOM neural
networks, each of which is
trained by different feature
vectors of length (4,5,6,7)
Company

LOGO

Watermark Insertion Procedure

Framework of the Proposed approaches for 3D mesh watermarking
Company

LOGO

Watermark Insertion Procedure

In the insertion procedure we use two insertion methods:
 The first method is based on
embedding watermark into the 3-D
mesh model by modifying the
distribution of vertex norms . The
distribution is divided into distinct
sections, referred to as bins, each of
which is used as a watermark
embedding unit to embed one bit of
watermark.

 The second method is based
on a new idea of partitioning
the watermark bits into two
part, The first part is inserted
on the norm distributions as
illustrated before while the
second part is inserted
directly in the vertices.
Company

LOGO

Watermark Extraction Procedure

Once the locations of watermark bits are located ,WM bits are extracted for
both approaches such that:

 The proposed approach I using the
first method of insertion is considered
a semi-blind watermarking procedure
All we need is the trained SOM to
detect the locations of watermark
insertion.

 For proposed approach II we
need the original mesh model
at extraction phase, So it is
considered as non-blind
watermarking procedure
Company

LOGO

Agenda
1. Motivations
2. Introduction
3. Objective and problem definition

4. Background
5. Proposed 3D watermarking scheme
6. Experimental Results
7. Conclusions.
Company

LOGO

Experimental Results
Data set description
Company

LOGO

Experimental Results
Distortion evaluation
Company

LOGO

Experimental Results
Distortion evaluation
Company

LOGO

Experimental Results
Robustness evaluation
Company

LOGO

Experimental Results
Robustness evaluation
Company

LOGO

Experimental Results
Robustness evaluation
Company

LOGO

Experimental Results
Robustness evaluation
Company

LOGO

Experimental Results
Robustness evaluation
Company

LOGO

Experimental Results
Robustness evaluation
Company

LOGO

Experimental Results
Robustness evaluation
Company

LOGO

Robustness response
Company

LOGO

Robustness response
Company

LOGO

Robustness response
Company

LOGO

Conclusions
 This work, provides a novel watermarking algorithm in which
vertices are selected from the 3D model for watermarking by
using SOM neural networks without causing perceptible
distortion.
 We use statistical watermarking methods for 3D mesh models
that modify the distribution of vertex norms via changing the
mean of each bin.
 To enhance both transparency and robustness we introduce
two novel approaches that insert watermark bits based on
intelligence vertex selection.
 Proposed approach I provides good results in terms of
imperceptibility while proposed approach II provides better
results in terms of robustness and at the same time it maintain
accepted results of imperceptibility.
Company

LOGO

Thank you
E-mail: mona.solyman@fci-cu.edu.eg

More Related Content

Viewers also liked

A new robust video watermarking technique using h_264_aac_codec luma componen...
A new robust video watermarking technique using h_264_aac_codec luma componen...A new robust video watermarking technique using h_264_aac_codec luma componen...
A new robust video watermarking technique using h_264_aac_codec luma componen...Iftikhar Ahmad
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 

Viewers also liked (8)

A new robust video watermarking technique using h_264_aac_codec luma componen...
A new robust video watermarking technique using h_264_aac_codec luma componen...A new robust video watermarking technique using h_264_aac_codec luma componen...
A new robust video watermarking technique using h_264_aac_codec luma componen...
 
my report
my reportmy report
my report
 
DLD_SYNOPSIS
DLD_SYNOPSISDLD_SYNOPSIS
DLD_SYNOPSIS
 
Watermark
WatermarkWatermark
Watermark
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Digital watermarks
Digital watermarksDigital watermarks
Digital watermarks
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 

Similar to 3 d wm monasolyman_10nov_ainshames

10.1007@978 3-319-29504-657
10.1007@978 3-319-29504-65710.1007@978 3-319-29504-657
10.1007@978 3-319-29504-657Manish Gupta
 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance VideoIRJET Journal
 
Lane Detection and Traffic Sign Recognition using OpenCV and Deep Learning fo...
Lane Detection and Traffic Sign Recognition using OpenCV and Deep Learning fo...Lane Detection and Traffic Sign Recognition using OpenCV and Deep Learning fo...
Lane Detection and Traffic Sign Recognition using OpenCV and Deep Learning fo...IRJET Journal
 
Partial Object Detection in Inclined Weather Conditions
Partial Object Detection in Inclined Weather ConditionsPartial Object Detection in Inclined Weather Conditions
Partial Object Detection in Inclined Weather ConditionsIRJET Journal
 
A Transfer Learning Approach to Traffic Sign Recognition
A Transfer Learning Approach to Traffic Sign RecognitionA Transfer Learning Approach to Traffic Sign Recognition
A Transfer Learning Approach to Traffic Sign RecognitionIRJET Journal
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
 
Virtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial RecognitionVirtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial RecognitionIRJET Journal
 
A Machine learning based framework for Verification and Validation of Massive...
A Machine learning based framework for Verification and Validation of Massive...A Machine learning based framework for Verification and Validation of Massive...
A Machine learning based framework for Verification and Validation of Massive...IRJET Journal
 
Digital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingDigital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingIRJET Journal
 
Drone flight data processing
Drone flight data processingDrone flight data processing
Drone flight data processingDany Laksono
 
CAR DAMAGE DETECTION USING DEEP LEARNING
CAR DAMAGE DETECTION USING DEEP LEARNINGCAR DAMAGE DETECTION USING DEEP LEARNING
CAR DAMAGE DETECTION USING DEEP LEARNINGIRJET Journal
 
ROAD SIGN DETECTION USING CONVOLUTIONAL NEURAL NETWORK (CNN)
ROAD SIGN DETECTION USING CONVOLUTIONAL NEURAL NETWORK (CNN)ROAD SIGN DETECTION USING CONVOLUTIONAL NEURAL NETWORK (CNN)
ROAD SIGN DETECTION USING CONVOLUTIONAL NEURAL NETWORK (CNN)IRJET Journal
 
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNETROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNETIRJET Journal
 
Licence Plate Recognition Using Supervised Learning and Deep Learning
Licence Plate Recognition Using Supervised Learning and Deep LearningLicence Plate Recognition Using Supervised Learning and Deep Learning
Licence Plate Recognition Using Supervised Learning and Deep LearningIRJET Journal
 
Realtime Face mask Detector using YoloV4
Realtime Face mask Detector using YoloV4Realtime Face mask Detector using YoloV4
Realtime Face mask Detector using YoloV4IRJET Journal
 
ADVANCED ALGORITHMS FOR ETCHING SIMULATION OF 3D MEMS-TUNABLE LASERS
ADVANCED ALGORITHMS FOR ETCHING SIMULATION OF 3D MEMS-TUNABLE LASERSADVANCED ALGORITHMS FOR ETCHING SIMULATION OF 3D MEMS-TUNABLE LASERS
ADVANCED ALGORITHMS FOR ETCHING SIMULATION OF 3D MEMS-TUNABLE LASERSijctcm
 
IRJET- Generating 3D Models Using 3D Generative Adversarial Network
IRJET- Generating 3D Models Using 3D Generative Adversarial NetworkIRJET- Generating 3D Models Using 3D Generative Adversarial Network
IRJET- Generating 3D Models Using 3D Generative Adversarial NetworkIRJET Journal
 
IRJET - A Detailed Review of Different Handwriting Recognition Methods
IRJET -  	  A Detailed Review of Different Handwriting Recognition MethodsIRJET -  	  A Detailed Review of Different Handwriting Recognition Methods
IRJET - A Detailed Review of Different Handwriting Recognition MethodsIRJET Journal
 

Similar to 3 d wm monasolyman_10nov_ainshames (20)

10.1007@978 3-319-29504-657
10.1007@978 3-319-29504-65710.1007@978 3-319-29504-657
10.1007@978 3-319-29504-657
 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance Video
 
K1803015864
K1803015864K1803015864
K1803015864
 
Lane Detection and Traffic Sign Recognition using OpenCV and Deep Learning fo...
Lane Detection and Traffic Sign Recognition using OpenCV and Deep Learning fo...Lane Detection and Traffic Sign Recognition using OpenCV and Deep Learning fo...
Lane Detection and Traffic Sign Recognition using OpenCV and Deep Learning fo...
 
Partial Object Detection in Inclined Weather Conditions
Partial Object Detection in Inclined Weather ConditionsPartial Object Detection in Inclined Weather Conditions
Partial Object Detection in Inclined Weather Conditions
 
A Transfer Learning Approach to Traffic Sign Recognition
A Transfer Learning Approach to Traffic Sign RecognitionA Transfer Learning Approach to Traffic Sign Recognition
A Transfer Learning Approach to Traffic Sign Recognition
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
 
Virtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial RecognitionVirtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial Recognition
 
A Machine learning based framework for Verification and Validation of Massive...
A Machine learning based framework for Verification and Validation of Massive...A Machine learning based framework for Verification and Validation of Massive...
A Machine learning based framework for Verification and Validation of Massive...
 
Digital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingDigital Image Security using Digital Watermarking
Digital Image Security using Digital Watermarking
 
Drone flight data processing
Drone flight data processingDrone flight data processing
Drone flight data processing
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
CAR DAMAGE DETECTION USING DEEP LEARNING
CAR DAMAGE DETECTION USING DEEP LEARNINGCAR DAMAGE DETECTION USING DEEP LEARNING
CAR DAMAGE DETECTION USING DEEP LEARNING
 
ROAD SIGN DETECTION USING CONVOLUTIONAL NEURAL NETWORK (CNN)
ROAD SIGN DETECTION USING CONVOLUTIONAL NEURAL NETWORK (CNN)ROAD SIGN DETECTION USING CONVOLUTIONAL NEURAL NETWORK (CNN)
ROAD SIGN DETECTION USING CONVOLUTIONAL NEURAL NETWORK (CNN)
 
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNETROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
 
Licence Plate Recognition Using Supervised Learning and Deep Learning
Licence Plate Recognition Using Supervised Learning and Deep LearningLicence Plate Recognition Using Supervised Learning and Deep Learning
Licence Plate Recognition Using Supervised Learning and Deep Learning
 
Realtime Face mask Detector using YoloV4
Realtime Face mask Detector using YoloV4Realtime Face mask Detector using YoloV4
Realtime Face mask Detector using YoloV4
 
ADVANCED ALGORITHMS FOR ETCHING SIMULATION OF 3D MEMS-TUNABLE LASERS
ADVANCED ALGORITHMS FOR ETCHING SIMULATION OF 3D MEMS-TUNABLE LASERSADVANCED ALGORITHMS FOR ETCHING SIMULATION OF 3D MEMS-TUNABLE LASERS
ADVANCED ALGORITHMS FOR ETCHING SIMULATION OF 3D MEMS-TUNABLE LASERS
 
IRJET- Generating 3D Models Using 3D Generative Adversarial Network
IRJET- Generating 3D Models Using 3D Generative Adversarial NetworkIRJET- Generating 3D Models Using 3D Generative Adversarial Network
IRJET- Generating 3D Models Using 3D Generative Adversarial Network
 
IRJET - A Detailed Review of Different Handwriting Recognition Methods
IRJET -  	  A Detailed Review of Different Handwriting Recognition MethodsIRJET -  	  A Detailed Review of Different Handwriting Recognition Methods
IRJET - A Detailed Review of Different Handwriting Recognition Methods
 

More from Aboul Ella Hassanien

الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdfالأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdfAboul Ella Hassanien
 
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...Aboul Ella Hassanien
 
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...Aboul Ella Hassanien
 
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...Aboul Ella Hassanien
 
Intelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptxIntelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptxAboul Ella Hassanien
 
دليل البحث العلمى .pdf
دليل البحث العلمى .pdfدليل البحث العلمى .pdf
دليل البحث العلمى .pdfAboul Ella Hassanien
 
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات Aboul Ella Hassanien
 
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي  الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي Aboul Ella Hassanien
 
الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى Aboul Ella Hassanien
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنيةAboul Ella Hassanien
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنيةAboul Ella Hassanien
 
التغير المناخى للاطفال
التغير المناخى للاطفالالتغير المناخى للاطفال
التغير المناخى للاطفالAboul Ella Hassanien
 
الذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفالالذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفالAboul Ella Hassanien
 
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسىإستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسىAboul Ella Hassanien
 
الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية  الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية Aboul Ella Hassanien
 
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...Aboul Ella Hassanien
 
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسيةالذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسيةAboul Ella Hassanien
 
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى Aboul Ella Hassanien
 

More from Aboul Ella Hassanien (20)

الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdfالأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
 
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
 
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
 
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
 
Intelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptxIntelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptx
 
دليل البحث العلمى .pdf
دليل البحث العلمى .pdfدليل البحث العلمى .pdf
دليل البحث العلمى .pdf
 
SRGE photo.pdf
SRGE photo.pdfSRGE photo.pdf
SRGE photo.pdf
 
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
 
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي  الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
 
الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
 
التغير المناخى للاطفال
التغير المناخى للاطفالالتغير المناخى للاطفال
التغير المناخى للاطفال
 
الذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفالالذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفال
 
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسىإستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
 
الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية  الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية
 
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
 
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسيةالذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
 
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
 
اقتصاد ميتافيرس
اقتصاد ميتافيرساقتصاد ميتافيرس
اقتصاد ميتافيرس
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

3 d wm monasolyman_10nov_ainshames