Remote sensing techniques used in many studies for classfying and measuring of wildfires. Satellite Landsat8(OLI) imagery is used in the presented work. The satellite is considered as a near-polar orbit, with a high multispectral resolution for covering Wollemi National Park in Australia. The work aims to study and measure wildfire natural resources prior to and throughout fire breakout which occurred in Wollemi National Park in Australia for a year (October, 2019), as well as analyzing the harm resulting from such wildfires and their effects on earth and environment through recognizing satellite images for studied region prior to and throughout wildfires. A discussion of methods for computing the affecred area is covered regarding each one of the classes and lessening or limiting the quickly-spreading wildfires damage. This paper propose a 2-phases techniques: training and classifying. In the training phase, the number of clustering is computed by using C# Programming Language and feature extracted and clustered as a group and stored in the dataset. The classification used the moments with (K-Means) classification approach in RS (Remote Sensing) for classified image. The results of classification showed 5 distinctive classes (trees, rivers, bare earth, buildings with no trees, and buildings with trees) in which it might be indicates that the region is secured via each one of the classes prior to and throughout wildfires as well as the changed pixels with regard to all the classes. Also, the classification experimental methods results indicate an excellent performance recision with a good classifying and result analysis about the harms caused by fires in the study area.
Compressing an image and reconstructing it without degrading its original quality is one of the challenges that still exist now a day. A coding system that considers both quality and compression rate is implemented in this work. The implemented system applies a high synthetic entropy coding schema to store the compressed image at the smallest size as possible without affecting its original quality. This coding schema is applied with two transform-based techniques, one with Discrete Cosine Transform and the other with Discrete Wavelet Transform. The implemented system was tested with different standard color images and the obtained results with different evaluation metrics have been shown. A comparison was made with some previous rel
... Show MoreThe paper tackles two topics. The first is about the term "Ремейк" which is very common in contemporary Russian literature; it has counterparts such as " Обработка" and " Переделка", where these two may indicate any of the following meanings (remake, reformulate, rewrite, treatment, modification, change). It has been shown that this term does not have a stable definition. Also, the role of this term in literary studies has been mentioned along with how it has come to its peak of use in post-modern literature.
The second is that I have taken a sample of well-known works in Russian literature " On the Eve, On the Eve " by the contemporary Russian writer YevgueniBobov, and shown the effort of the writer
... Show MoreThe adsorption ability of Iraqi initiated calcined granulated montmorillonite to adsorb Symmetrical Schiff Base Ligand 4,4’-[hydrazine-1, 2-diylidenebis (methan-1-yl-1-ylidene)) bis (2-methoxyphenol)] derived from condensation reaction of hydrazine hydrate and 4-hydroxy-3-methoxybenzaldehyde, from aqueous solutions has been investigated through columnar method.The ligand (H2L) adsorption found to be dependent on adsorbent dosage, initial concentration and contact time.All columnar experiments were carried out at three different pH values (5.5, 7and 8) using buffer solutions at flow rate of (3 drops/ min.),at room temperature (25±2)°C. The experimental isotherm data were analyzed using Langmuir, Freundlich and Temkin equations. The monol
... Show MoreThe health care provided by health institutions and all kinds suffers from many problems, and since the health services provided are related to human life, it is necessary to shed light on this activity and identify the causes of these problems. This research aims to Definition of health institutions (hospitals) Performance audit of these institutions according to the latest indicators, which are the standards of health accreditation for hospitals, specifically the basic standards issued by the Health Care Accreditation Council (HCAC) to reach the level of performance and Knowledge of Constraints that lead to in an acceptable manner consistent with the approved standards. In theoretical and practical study, a number of conclusions were r
... Show MoreIssam al-Din al-Asfrani's footnote
On the interpretation of the oval
Imam
Issam al-Din Ibrahim Arbashah al-Asfrani
(Th 159 e)
Surah Al-Baqarah (verse 55-911)
This paper deals with proposing new lifting scheme (HYBRID Algorithm) that is capable of preventing images and documents which are fraud through decomposing there in to the real colors value arrays (red, blue and green) to create retrieval keys for its properties and store it in the database and then check the document originality by retrieve the query image or document through the decomposition described above and compare the predicted color values (retrieval keys) of the query document with those stored in the database. The proposed algorithm has been developed from the two known lifting schemes (Haar and D4) by merging them to find out HYBRID lifting scheme. The validity and accuracy of the proposed algorithm have been ev
... Show MoreIn this paper, a hybrid image compression technique is introduced that integrates discrete wavelet transform (DWT) and linear polynomial coding. In addition, the proposed technique improved the midtread quantizer scheme once by utilizing the block based and the selected factor value. The compression system performance showed the superiority in quality and compression ratio compared to traditional polynomial coding techniques.
The widespread use of images, especially color images and rapid advancement of computer science, have led to an emphasis on securing these images and defending them against intruders. One of the most popular ways to protect images is to use encryption algorithms that convert data in a way that is not recognized by someone other than the intended user. The Advanced Encryption Standard algorithm (AES) is one of the most protected encryption algorithms. However, due to various types of theoretical and practical assaults, like a statistical attack, differential analysis, and brute force attack, its security is under attack.
In this paper, a modified AES coined as (M-AES) is proposed to improve the efficiency
... Show More