@misc{1802.06852,
author = {Zeeshan Bhatti and Ahsan Abro and Abdul Rehman Gillal and Mostafa Karbasi},
title = {{B}e-{E}ducated: {M}ultimedia {L}earning through 3{D} {A}nimation},
year = {2018},
eprint = {1802.06852},
howpublished = {INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND EMERGING TECHNOLOGIES,(IJCET)- VOL1(1) DECEMBER 2017- 13-22},
note = {arXiv:1802.06852v1}
}

Multimedia learning tools and techniques are placing its importance with large scale in education sector. With the help of multimedia learning, various complex phenomenon and theories can be explained and taught easily and conveniently. This project aims to teach and spread the importance of education and respecting the tools of education: pen, paper, pencil, rubber. To achieve this cognitive learning, a 3D animated movie has been developed using principles of multimedia learning with 3D cartoon characters resembling the actual educational objects, where the buildings have also been modelled to resemble real books and diaries. For modelling and animation of these characters, polygon mesh tools are used in 3D Studio Max. Additionally, the final composition of video and audio is performed in adobe premiere. This 3D animated video aims to highlight a message of importance for education and stationary. The Moral of movie is that do not waste your stationary material, use your Pen and Paper for the purpose they are made for. To be a good citizen you have to Be-Educated yourself and for that you need to give value to Pen. The final rendered and composited 3D animated video reflects this moral and portrays the intended message with very vibrant visuals

@misc{1802.07119,
author = {Behrouz Bolourian Haghighi and Amir Hossein Taherinia and Reza Monsefi},
title = {{TRLF}: {A}n {E}ffective {S}emi-fragile {W}atermarking {M}ethod for {T}amper {D}etection and {R}ecovery based on {LWT} and {FNN}},
year = {2018},
eprint = {1802.07119},
note = {arXiv:1802.07119v1}
}

This paper proposes a novel method for tamper detection and recovery using semi-fragile data hiding, based on Lifting Wavelet Transform (LWT) and Feed-Forward Neural Network (FNN). In TRLF, first, the host image is decomposed up to one level using LWT, and the Discrete Cosine Transform (DCT) is applied to each 2*2 blocks of diagonal details. Next, a random binary sequence is embedded in each block as the watermark by correlating $DC$ coefficients. In authentication stage, first, the watermarked image geometry is reconstructed by using Speeded Up Robust Features (SURF) algorithm and extract watermark bits by using FNN. Afterward, logical exclusive-or operation between original and extracted watermark is applied to detect tampered region. Eventually, in the recovery stage, tampered regions are recovered by image digest which is generated by inverse halftoning technique. The performance and efficiency of TRLF and its robustness against various geometric, non-geometric and hybrid attacks are reported. From the experimental results, it can be seen that TRLF is superior in terms of robustness and quality of the digest and watermarked image respectively, compared to the-state-of-the-art fragile and semi-fragile watermarking methods. In addition, imperceptibility has been improved by using different correlation steps as the gain factor for flat (smooth) and texture (rough) blocks.

@misc{1802.07180,
author = {Tamara Koljensic and Caslav Labudovic},
title = {{C}omparison of threshold-based algorithms for sparse signal recovery},
year = {2018},
eprint = {1802.07180},
note = {arXiv:1802.07180v1}
}

Intensively growing approach in signal processing and acquisition, the Compressive Sensing approach, allows sparse signals to be recovered from small number of randomly acquired signal coefficients. This paper analyses some of the commonly used threshold-based algorithms for sparse signal reconstruction. Signals satisfy the conditions required by the Compressive Sensing theory. The Orthogonal Matching Pursuit, Iterative Hard Thresholding and Single Iteration Reconstruction algorithms are observed. Comparison in terms of reconstruction error and execution time is performed within the experimental part of the paper.