Preferred Language
Articles
/
VRaFrosBVTCNdQwCH9ar
Satellite image classification using KL-transformation and modified vector quantization
...Show More Authors

In this work, satellite images classification for Al Chabaish marshes and the area surrounding district in (Dhi Qar) province for years 1990,2000 and 2015 using two software programming (MATLAB 7.11 and ERDAS imagine 2014) is presented. Proposed supervised classification method (Modified Vector Quantization) using MATLAB software and supervised classification method (Maximum likelihood Classifier) using ERDAS imagine have been used, in order to get most accurate results and compare these methods. The changes that taken place in year 2000 comparing with 1990 and in year 2015 comparing with 2000 are calculated. The results from classification indicated that water and vegetation are decreased, while barren land, alluvial soil and shallow water are increased for year 2000 comparing with 1990. Water, vegetation and barren land are increased, while alluvial soil and shallow water decreased for years 2015 comparing with 2000. The classification accuracy for the proposed method (MVQ) is 90.1%, 90.9% and 90.2% for years 1990, 2000 and 2015, respectively.

Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
The Satellite Images Matching and Mosaic Techniques
...Show More Authors

      The Matching and Mosaic of the satellite imagery play an essential role in many remote sensing and image processing projects. These techniques must be required in a particular step in the project, such as remotely change detection applications and the study of large regions of interest. The matching and mosaic methods depend on many image parameters such as pixel values in the two or more images, projection system associated with the header files, and spatial resolutions, where many of these methods construct the matching and mosaic manually. In this research, georeference techniques were used to overcome the image matching task in semi automotive method. The decision about the quality of the technique can be considered i

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Probabilistic Model building using the Transformation Entropy for the Burr type –xii Distribution
...Show More Authors

Entropy define as uncertainty measure has been transfared by using the cumulative distribution function and reliability function for the Burr type – xii. In the case of data which suffer from volatility to build a model the probability distribution on every failure of a sample after achieving limitations function, probabilistic distribution. Has been derived formula probability distribution of the new transfer application entropy on the probability distribution of continuous Burr Type-XII and tested a new function and found that it achieved the conditions function probability, been derived mean and function probabilistic aggregate in order to be approved in the generation of data for the purpose of implementation of simulation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Engineering And Technology Journal
Face Retrieval Using Image Moments and Genetic Algorithm
...Show More Authors

Publication Date
Wed Jun 01 2022
Journal Name
V. International Scientific Congress Of Pure, Applied And Technological Sciences
Lightweight Image Compression Using Polynomial and Transform Coding
...Show More Authors

Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Civil And Environmental Engineering
Developing A Mathematical Model for Planning Repetitive Construction Projects By Using Support Vector Machine Technique
...Show More Authors
Abstract<p>Each project management system aims to complete the project within its identified objectives: budget, time, and quality. It is achieving the project within the defined deadline that required careful scheduling, that be attained early. Due to the nature of unique repetitive construction projects, time contingency and project uncertainty are necessary for accurate scheduling. It should be integrated and flexible to accommodate the changes without adversely affecting the construction project’s total completion time. Repetitive planning and scheduling methods are more effective and essential. However, they need continuous development because of the evolution of execution methods, essent</p> ... Show More
View Publication
Crossref (3)
Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
2021 Ieee/cvf Conference On Computer Vision And Pattern Recognition Workshops (cvprw)
Alps: Adaptive Quantization of Deep Neural Networks with GeneraLized PositS
...Show More Authors

View Publication
Scopus (11)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Engineering
Permeability Estimation by Using the Modified and Conventional FZI Methods
...Show More Authors

There many methods for estimation of permeability. In this Paper, permeability has been estimated by two methods. The conventional and modified methods are used to calculate flow zone indicator (FZI). The hydraulic flow unit (HU) was identified by FZI technique. This technique is effective in predicting the permeability in un-cored intervals/wells. HU is related with FZI and rock quality index (RQI). All available cores from 7 wells (Su -4, Su -5, Su -7, Su -8, Su -9, Su -12, and Su -14) were used to be database for HU classification. The plot of probability cumulative of FZI is used. The plot of core-derived probability FZI for both modified and conventional method which indicates 4 Hu (A, B, C and D) for Nahr Umr forma

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Al-academy
Interaction and functional structural transformation of product design
...Show More Authors

The research discussed the propositions of functional structures and the requirements for their transformation according to the variables of use and human interaction through the variables of functions with one form products، multifunctional variables، and transforming form in one product. The patterns of user’s interaction with products were discussed through the variables of functional type، starting from defining the types of functions in the industrial product structures to: practical functions، which were classified into: informational functions، ergonomic functions، use، handling، comfort، global، anthropometric adaptation and physical postures. While the interaction variables were discussed according to the meaning fun

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Middle-east Journal Of Scientific Research
Question Classification Using Different Approach: A Whole Review
...Show More Authors

Preview PDF