Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
 
Articles by Nur Mohammad
Total Records ( 4 ) for Nur Mohammad
  Ahmed A. Abdulfetah , Xingming Sun , Hengfu Yang and Nur Mohammad
  In this study, two image adaptive invisible digital watermarking algorithms based on DWT and DCT are proposed for copyright protection. The first proposed algorithm utilizes Watson’s visual model (JND) to determine the watermarking strength necessary to invisibly embed the watermark in the DCT block coefficients of the cover image by controlling the power of strength of JND. The second proposed technique embeds the watermark by modifying coefficients of the vertical and the horizontal detail sub-bands of wavelet sub-blocks, chosen with a secret key. The visual model is designed to generate a Just Noticeable Difference mask (JND) by analyzing image characteristics such as textures and luminance of the cover image in the DWT based domain. Since, the secret key is required for both embedding and extraction of watermark, it is not possible for an unauthorized user to extract the embedded watermark. The proposed schemes are robust to common image processing distortions like filtering, JPEG compression and noise. Experimental results show that the proposed schemes are efficient, imperceptible and the quality of watermarked image is very well and robust for various image processing distortions.
  Nur Mohammad , Xingming Sun and Hengfu Yang
  The Development of modern communication technology, demand for digital image, audio, video and other contents transmission and storage are increasing rapidly. To protect digital product and ensure the secure transfer of the digital items become important issue in home and abroad. The researcher developed many algorithms; these are some specific fields. But can’t grantee the whole safety of the contents. The Block Truncation Coding one of the effective and real time application for the hiding data compare with transform domain and other techniques. In a coding technique, a number of bits required to represent an image which needs less data store and less computation. Application of coding in the field of image processing generally concern image data compression for storage and transmission as well as feature extraction for pattern recognition. Most existing BTC-based data hiding algorithms do not fully exploit visual perception of the host images and cannot obtain high hiding capacity and visual quality. For fully exploit visual perception and high hiding capacity, an excellent data hiding scheme based on BTC is proposed. First, the BTC scheme uses a two level (one-bit) nonparametric quantizer that adapts to local properties of the image. Second we employed Human Visual System (HVS) masking characteristics which ensure high visual quality of stego image. At the last, we embedded the data into the modified bitmap of BTC. The experimental results show that the proposed algorithm has good transparency, high hiding capacity and the visual quality of stego-images is very good.
  Nur Mohammad , Xingming Sun and Hengfu Yang
  The development of modern communication technology, demand for digital image, audio, video and other digital contents transmission and storage are increasing rapidly. To protect digital product and ensure the secure transfer of the digital content become important issue in every fields. The researcher developed many visible watermarking algorithms; these are some specific fields. But can’t applicable of the digital image perfectly. In this research, An Adaptive Visible Watermarking Algorithm for BTC compressed images presented. BTC one of the effective and real time application for the image compression compare with transform domain and other data hiding techniques. Existing BTC-based visible data hiding algorithms do not fully exploit visual perception of the host images. That is why cannot obtain high hiding capacity and high visual quality of watermarked-images and visible watermark images. To obtain high visual quality of watermarked images and good perceptual visible watermark image, an adaptive scaling factor and embedding factor calculated by exploiting luminance and texture masking characteristics of digital images. This study is useful for modern communication technology. An Adaptive Visible Watermarking Algorithm for BTC compressed images is presented in the paper. For the more, the experimental results proved that the algorithm adaptive visible hiding information capacity is very high. So, the visual quality of watermarked-images and visible watermark image is very good.
  Nur Mohammad and Tarequl Karim
  A solar tracking system is the device for orienting solar photovoltaic modules and solar thermal collectors toward the sun. This study presents a microcontroller based energy efficient hybrid automatic solar tracking system with a view to assess the improvement in solar conversion efficiency. The two-axis solar tracking system is constructed with both hardware and software implementations. The proposed tracking system uses a new solar sensor position with an adaptive feature. The economical analysis of the solar tracking systems is an important element of this reaearch. A comparative analysis was performed using three systems, i.e., hybrid, dual-axis tracking, single-axis and stationary module. The results showed that the use of the dual-axis tracking system produced 18% gain of power output, compared with a single-axis tracking system. The gain of output power with the dual-axis tracking system was much higher (54%) when compared with a stationary system inclined at 23.5° to the horizontal which is reasonable. Considering the state of the art of the technology, successful strategy, robust control philosophy and the potential added benefit of this research can be employed on a large scale in sustainable manner.
 
 
 
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility