In this review paper, several studies and researches were surveyed for assisting future researchers to identify available techniques in the field of classification of Synthetic Aperture Radar (SAR) images. SAR images are becoming increasingly important in a variety of remote sensing applications due to the ability of SAR sensors to operate in all types of weather conditions, including day and night remote sensing for long ranges and coverage areas. Its properties of vast planning, search, rescue, mine detection, and target identification make it very attractive for surveillance and observation missions of Earth resources. With the increasing popularity and availability of these images, the need for machines has emerged to enhance the ability to identify and interpret these images effectively. This is due to the fact that SAR image processing requires the formation of an image from the measured radar scatter returns, followed by a treatment to discover and define the image's composition. After reviewing several previous studies that succeeded in achieving a classification of SAR images for specific goals, it became obvious that they could be generalized to all types of SAR images. The most prominent use of Convolutional Neural Networks (CNN) was successful in extracting features from the images and training the neural network to analyze and classify them into classes according to these features. The dataset used in this model was obtained from the Moving and Stationary Target Acquisition and Recognition (MSTAR) database, which consists of a set of SAR images of military vehicles, for which the application of the CNN approach achieved a final accuracy of 97.91% on ten different classes.
The importance of evaluation depends on many institutions, whether governmental or private, including media institutions, rely on the list to evaluate the weight of things and appreciation, as well as judging things, achievements, and everything related to the institution is concerned. Because through evaluation, institutions can recognize weaknesses and strengths. It is also an effective tool for management review, through which the institution can review everything related to planning and decision-making, leadership, incentives and other administrative matters.
Therefore, this study attempts to shed light on the evaluation process, its basics and its importance in general and in the Kurdish media institutions as a model in part
... Show More<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreFace recognition system is the most widely used application in the field of security and especially in border control. This system may be exposed to direct or indirect attacks through the use of face morphing attacks (FMAs). Face morphing attacks is the process of producing a passport photo resulting from a mixture of two images, one of which is for an ordinary person and the other is a judicially required. In this case, a face recognition system may allow travel of persons not permitted to travel through face morphing image in a Machine-Readable Electronic Travel Document (eMRTD) or electronic passport at Automatic Border Control (ABC) gates. In creating an electronic passport, most countries rely on applicant to submit ima
... Show MoreThis is a survey study that presents recent researches concerning factional controllers. It presents several types of fractional order controllers, which are extensions to their integer order counterparts. The fractional order PID controller has a dominant importance, so thirty-one paper are presented for this controller. The remaining types of controllers are presented according to the number of papers that handle them; they are fractional order sliding mode controller (nine papers), fuzzy fractional order sliding mode controller (five papers), fractional order lag-lead compensator (three papers), fractional order state feedback controller (three papers), fractional order fuzzy logic controller (three papers). Finally, several conclusions
... Show MoreThis is a survey study that presents recent researches concerning factional controllers. It presents several types of fractional order controllers, which are extensions to their integer order counterparts. The fractional order PID controller has a dominant importance, so thirty-one paper are presented for this controller. The remaining types of controllers are presented according to the number of papers that handle them; they are fractional order sliding mode controller (nine papers), fuzzy fractional order sliding mode controller (five papers), fractional order lag-lead compensator (three papers), fractional order state feedback controller (three papers), fractional order fuzzy logic controller (three papers). Finally,
... Show MoreRadiation measuring devices need to process calibration which
lose their sensitivity and the extent of the response and the amount of
stability under a changing conditions from time to time and this
period depends on the nature and use of field in which used devices.
A comparison study was done to a (451P) (ionization chamber
survey meter) and this showed the variation of calibration factor in
five different years. This study also displayed the concept of
radiation instrument calibration and necessity of every year
calibration of them.
In this project we used the five years calibration data for ionization
chamber survey meter model Inspector (451P) to get that the values
of Calibration Factor (CF) and Res
In this review paper a number of studies and researches are surveyed, in order to assist the upcoming researchers, to know about the techniques available in the field of semantic based video retrieval. The video retrieval system is used for finding the users’ desired video among a huge number of available videos on the Internet or database. This paper gives a general discussion on the overall process of the semantic video retrieval phases. In addition to its present a generic review of techniques that has been proposed to solve the semantic gap as the major scientific problem in semantic based video retrieval. The semantic gap is formed because of the difference between the low level features that are extracted from video content and u
... Show More