عرض تقديمي بعنوان مناهج البحث العلمي
مقدم من أكاديمية بي تي اس للبحث العلمي والتطوير
. يتضمن مفهوم منهج البحث و انواع مناهج البحث بالتفصيل
www.bts-academy.com
نتمى لكم الفائدة والنجاح ..
عرض تقديمي بعنوان مناهج البحث العلمي
مقدم من أكاديمية بي تي اس للبحث العلمي والتطوير
. يتضمن مفهوم منهج البحث و انواع مناهج البحث بالتفصيل
www.bts-academy.com
نتمى لكم الفائدة والنجاح ..
Summarize for Principles of Statistics (ٍStat 500) and it's Lectures for students of Computer Science in Institute of Statistical Studies and Research - Cairo University
Summarize for Principles of Statistics (ٍStat 500) . it's Lectures for students of Computer Science and especially students of graduate studies of the Institute of Statistical Studies and Research - Cairo University
This document discusses non-parametric methods, which are also known as distribution-free methods. It outlines four common non-parametric tests: 1) Wilcoxon signed-rank test, which is used to compare two related samples; 2) Sign test, which tests whether the probability of a positive outcome is equal to the probability of a negative outcome; 3) Mann-Whitney U test, which compares two independent groups; and 4) Kruskal-Wallis H test, which compares more than two independent groups. Non-parametric methods make fewer assumptions about the distribution of the population than parametric methods.
This document discusses statistical hypothesis testing and statistical inferences. It notes that statistical hypothesis testing is one of the most important applications of probability theory in statistics. This allows researchers to make decisions about accepting or rejecting hypotheses based on sample data. The process of decision making through hypothesis testing involves multiple steps, including drawing a representative sample, collecting relevant data, applying statistical rules to test hypotheses, and making a decision based on results. Statistical inferences aim to estimate unknown population parameters through sampling and probability theory plays a key role in this process and in decision making more broadly.
Osama Hosam Eldeen
Database Foundations
has successfully completed 30 hours of professional development
for the following Oracle Academy course:
on 05 December 2019
Adaptive block-based pixel value differencing steganographyOsama Hosam
Steganography is the science of hiding secure data in digital carriers such as images and videos. Pixel value differencing
(PVD) steganography algorithms embed data into images depending on pixel neighborhood differences. We have pro-
posed PVD scheme for embedding secure data into digital images. The image is divided into non-overlapping 33 blocks.
The block’s median pixel is used as a reference for calculating pixel differences. The distance between the minimum and
maximum differences are fine tuned for spreading the secure data on a wide range of image regions with high-intensity
fluctuations. The embedding procedure embeds secure data into the content regions with edges and intensity transitions.
Texture images provide higher embedding size compared with regular images. The results showed that the proposed
algorithm is successfully able to avoid smooth regions in the embedding process. In addition, the proposed algorithm
shows better embedding quality compared with the state of the art PVD approaches especially with low-embedding rates.
Taibah University Digital Library [TUDL]Osama Hosam
In this project we discuss the establishment of a website for Taibah University. We called it Taibah University Digital Library (TUDL). TUDL is aimed for Instructors, Teaching Members, Students and Employees. This site allows students to download Taibah University related books, course slides, specific abbreviation of courses and related materials. The motivation was that, in Taibah University we don’t have e-library serves for Taibah University specific courses and its related materials.
The project site will be implemented in the following stages, the first stage is Analysis and planning, it includes motivation and project domain in addition to an extensive study of related digital libraries. The second stage is initiation &project organization; it includes assumptions and risks analysis and planning of the design incentives which is included in the design phase of the project. The third stage is analysis and design; it includes the requirements gathering especially functional requirements. TUDL proposal has great impact and positive feedback from both students and teaching members.
Reconstructing and Watermarking Stereo Vision Systems-PhD Presentation Osama Hosam
We have solved the correspondence problem by applying the matching process in two levels, the first level is Feature based matching, in which we have extracted the features of both images by creating multi-resolution images and applying histogram segmentation. The resulting features are region features; a comparison is done between the regions in the first image with the regions of the second image to get the disparity map.
The second level is Area-based matching in which we applied the Wavelet transform to get an expected window size as a search area for each pixel. We have joined the two levels to obtain more accurate pixel by pixel correspondence. We also obtained an adaptive search range and window size for each pixel to reduce the mismatches. Our procedure introduced high accuracy results and denser depth information.
The depth information is used to get the final 3D model – using only pair of images will create 2.5D model, using more than pair of images will create 3D model, we will refer to 3D model as a general output of stereo reconstruction– After reconstructing the model, in some applications it is needed to be published online. For example suppose the reconstructed model is a model for Sphinx – Famous statue in Egypt – The reconstruction for the model can be done in many days or months; then the model will be published online to let Internet users around the world watch the model. Therefore, techniques should be used to protect the copyright for that model. We have applied new fragile watermarking technique to secure the 3D reconstructed model and protect its copyright.