Preferred Language
Articles
/
ijp-228
Change detection of remotely sensed image using NDVI subtractive and classification methods.
...Show More Authors

Change detection is a technology ascertaining the changes of
specific features within a certain time Interval. The use of remotely
sensed image to detect changes in land use and land cover is widely
preferred over other conventional survey techniques because this
method is very efficient for assessing the change or degrading trends
of a region. In this research two remotely sensed image of Baghdad
city gathered by landsat -7and landsat -8 ETM+ for two time period
2000 and 2014 have been used to detect the most important changes.
Registration and rectification the two original images are the first
preprocessing steps was applied in this paper. Change detection using
NDVI subtractive has been computed, subtractive between the bands
of the two images and the ratio of the red to blue bands was also
computed. Change detection mask using minimum distance
classification or detection after classification have be also used to
compute the changes between the resultant classes, many statistical
properties of the original and process image have been illustrated in
this research

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
Al-academy
Structural elements of composition design for fabrics image Image footage model
...Show More Authors

End of the twentieth century witnessed by the technological evolution Convergences between the visual arts aesthetic value and objective representation of the image in the composition of the design of the fabric of new insights and unconventional potential in atypical employment. It is through access to the designs of modern fabrics that address the employment picture footage included several scenes footage from the film, which focuses on research and analytical as a study to demonstrate the elements of the picture and the organization of its rules and how to functioning in the design of fabrics, Thus, it has identified the problem by asking the following: What are the elements of the picture footage and how the functioning of the struct

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 05 2025
Journal Name
Mesopotamian Journal Of Computer Science
DGEN: A Dynamic Generative Encryption Network for Adaptive and Secure Image Processing
...Show More Authors

Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Lossless and Lossy Polynomial Image Compression
...Show More Authors

Crossref (1)
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Lossless and Lossy Polynomial Image Compression
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Wed Jun 12 2019
Journal Name
Al–bahith Al–a'alami
Viewing television in media convergence era Rites change and practices transformation
...Show More Authors


The present article concerns one of the objects of media sociology under construction. The transformation of the rites in the use of the television contents in the era of digital technologies and media convergence. By an analytic contextual approach, based on the study of the uses, we formulate the following hypothesis: so many changes in the rites of uses are real, in particular at the young people, so, many pieces integer of the everyday life remain impervious to these changes, and it is true under the influence of a slowness of the social and cultural orders, rooted for a long time in the traditional social fabric. We shall then try to bring a sociological look to this societal, cultural, and communicational object that is the pas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 22 2022
Journal Name
Webology
Change and Strategic Planning for Quality in Universities: An Analytical Study
...Show More Authors

This research aims to analyse the problem of organizations in general and universities in particular, in dealing with �quality subjects� in a world where these organizations face the risks of becoming side lined and possibly vanished without looking for solutions that allow them to move in an open arena where change becomes the key to those solutions. Change here must be strategic and planning must adopts a way for organizations to develop mechanisms to manage change itself. Management leaders play a central role in achieving the principle required to chart new trends for universities in dealing with quality as a strategy that allows excellence and competition in light of the success of the processes of change. Change through reengineer

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Sat Apr 19 2025
Journal Name
Plos One
Early Detection of Autism Spectrum Disorder in Children Using Different Machine Learning Algorithms
...Show More Authors
Abstract<p>Autism spectrum disorder(ASD) is a neurological condition marked by impaired communication abilities, social detachment, and repetitive behaviors in individuals. Global health organization facing difficulties in establishing an effective ASD diagnostic system that facilitates precise analysis and early autism prediction. It is a scientific issue that necessitates resolution. This research presents an approach for the early prediction of children with ASD utilizing significant variables through machine learning (ML) methods. Three stages comprise the suggested technique. First, a 1250-case ASD dataset was identified and preprocessed. Five extremely effective traits with high Pearson c</p> ... Show More
View Publication
Crossref
Publication Date
Thu Oct 02 2014
Journal Name
Journal Of The Islamic University College
The image of the family in dubbed Turkish series and their potential impact on Iraqi youth
...Show More Authors

Since the nineties of the last century, Iraqi youth have been exposed to Mexican soap operas dubbed into classical Arabic, and the stories and ideas presented by these series were almost new to all the minds of the youth at that time, a culture completely different from the culture we have of social relations, and since the number of episodes was more than Of the 100 episodes, exposure to these series has left young people confused by the addiction to all their ideas and stories. They differ from the foreign films (mostly American) that we used to watch, and they only take two hours (at most). These films contain diverse stories and may be forgotten. Memory includes events and characters in their entirety at times, and you may remember th

... Show More
Publication Date
Mon Jan 01 2024
Journal Name
Bio Web Of Conferences
Concepts of statistical learning and classification in machine learning: An overview
...Show More Authors

Statistical learning theory serves as the foundational bedrock of Machine learning (ML), which in turn represents the backbone of artificial intelligence, ushering in innovative solutions for real-world challenges. Its origins can be linked to the point where statistics and the field of computing meet, evolving into a distinct scientific discipline. Machine learning can be distinguished by its fundamental branches, encompassing supervised learning, unsupervised learning, semi-supervised learning, and reinforcement learning. Within this tapestry, supervised learning takes center stage, divided in two fundamental forms: classification and regression. Regression is tailored for continuous outcomes, while classification specializes in c

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Crossref