In this study, an analysis of re-using the JPEG lossy algorithm on the quality of satellite imagery is presented. The standard JPEG compression algorithm is adopted and applied using Irfan view program, the rang of JPEG quality that used is 50-100.Depending on the calculated satellite image quality variation, the maximum number of the re-use of the JPEG lossy algorithm adopted in this study is 50 times. The image quality degradation to the JPEG quality factor and the number of re-use of the JPEG algorithm to store the satellite image is analyzed.
This research dealt with choosing the best satellite parking orbit and then the transition of the satellite from the low Earth orbit to the geosynchronous orbit (GEO). The aim of this research is to achieve this transition with the highest possible efficiency (lowest possible energy, time, and fuel consumption with highest accuracy) in the case of two different inclination orbits. This requires choosing a suitable primary parking orbit. All of the methods discussed in previous studies are based on two orbits at the same plane, mostly applying the circular orbit as an initial orbit. This transition required the use of the advanced technique of the Hohmann transfer method for the elliptical orbits, as we did in an earlier research, namely
... Show MoreThe perturbation of a satellite high orbit due to the presence of other
gravitational bodies (such as the Sun and the Moon) and SRP from the conservative
perturbing forces were studied, using our modified model. A precise calculation of
the perturbations is possible only if the initial orbit is sufficiently well known.
Orbital elements that have been entered hp=3000Km., inclination= 63ᵒ, 23ᵒ and
eccentricity= 0.1, longitude of ascending node 30ᵒ, argument of perigee 40ᵒ where
the orbital elements will deviate from initial values with time through 3000 days.
Newton-Rapson method was used to calculate the position and velocity with out
perturbation . The perturbed equation of motion solved numerically using
The research aims to reveal the relationship between the use of social networking sites and the image that females make about their physical formation, the nature of the effects, their value judgments about the image of their bodies, their attitudes toward plastic surgery, the most important types of these processes for them, their motivations to conduct them, and the cultural pressures they are exposed to. The study, moreover, investigates in the effects of those plastic surgery on their behavior as active and interacting users with what is published on social media, according to the theory of social comparison. This paper is an attempt to understand the pattern of social networking |
In this paper, image compression technique is presented based on the Zonal transform method. The DCT, Walsh, and Hadamard transform techniques are also implements. These different transforms are applied on SAR images using Different block size. The effects of implementing these different transforms are investigated. The main shortcoming associated with this radar imagery system is the presence of the speckle noise, which affected the compression results.
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreThe smart city concept has attracted high research attention in recent years within diverse application domains, such as crime suspect identification, border security, transportation, aerospace, and so on. Specific focus has been on increased automation using data driven approaches, while leveraging remote sensing and real-time streaming of heterogenous data from various resources, including unmanned aerial vehicles, surveillance cameras, and low-earth-orbit satellites. One of the core challenges in exploitation of such high temporal data streams, specifically videos, is the trade-off between the quality of video streaming and limited transmission bandwidth. An optimal compromise is needed between video quality and subsequently, rec
... Show MoreAnalysis of image content is important in the classification of images, identification, retrieval, and recognition processes. The medical image datasets for content-based medical image retrieval ( are large datasets that are limited by high computational costs and poor performance. The aim of the proposed method is to enhance this image retrieval and classification by using a genetic algorithm (GA) to choose the reduced features and dimensionality. This process was created in three stages. In the first stage, two algorithms are applied to extract the important features; the first algorithm is the Contrast Enhancement method and the second is a Discrete Cosine Transform algorithm. In the next stage, we used datasets of the medi
... Show More