Remote sensing techniques used in many studies for classfying and measuring of wildfires. Satellite Landsat8(OLI) imagery is used in the presented work. The satellite is considered as a near-polar orbit, with a high multispectral resolution for covering Wollemi National Park in Australia. The work aims to study and measure wildfire natural resources prior to and throughout fire breakout which occurred in Wollemi National Park in Australia for a year (October, 2019), as well as analyzing the harm resulting from such wildfires and their effects on earth and environment through recognizing satellite images for studied region prior to and throughout wildfires. A discussion of methods for computing the affecred area is covered regarding each one of the classes and lessening or limiting the quickly-spreading wildfires damage. This paper propose a 2-phases techniques: training and classifying. In the training phase, the number of clustering is computed by using C# Programming Language and feature extracted and clustered as a group and stored in the dataset. The classification used the moments with (K-Means) classification approach in RS (Remote Sensing) for classified image. The results of classification showed 5 distinctive classes (trees, rivers, bare earth, buildings with no trees, and buildings with trees) in which it might be indicates that the region is secured via each one of the classes prior to and throughout wildfires as well as the changed pixels with regard to all the classes. Also, the classification experimental methods results indicate an excellent performance recision with a good classifying and result analysis about the harms caused by fires in the study area.
Issam al-Din al-Asfrani's footnote
On the interpretation of the oval
Imam
Issam al-Din Ibrahim Arbashah al-Asfrani
(Th 159 e)
Surah Al-Baqarah (verse 55-911)
This paper deals with proposing new lifting scheme (HYBRID Algorithm) that is capable of preventing images and documents which are fraud through decomposing there in to the real colors value arrays (red, blue and green) to create retrieval keys for its properties and store it in the database and then check the document originality by retrieve the query image or document through the decomposition described above and compare the predicted color values (retrieval keys) of the query document with those stored in the database. The proposed algorithm has been developed from the two known lifting schemes (Haar and D4) by merging them to find out HYBRID lifting scheme. The validity and accuracy of the proposed algorithm have been ev
... Show MoreIn this paper, a hybrid image compression technique is introduced that integrates discrete wavelet transform (DWT) and linear polynomial coding. In addition, the proposed technique improved the midtread quantizer scheme once by utilizing the block based and the selected factor value. The compression system performance showed the superiority in quality and compression ratio compared to traditional polynomial coding techniques.
The widespread use of images, especially color images and rapid advancement of computer science, have led to an emphasis on securing these images and defending them against intruders. One of the most popular ways to protect images is to use encryption algorithms that convert data in a way that is not recognized by someone other than the intended user. The Advanced Encryption Standard algorithm (AES) is one of the most protected encryption algorithms. However, due to various types of theoretical and practical assaults, like a statistical attack, differential analysis, and brute force attack, its security is under attack.
In this paper, a modified AES coined as (M-AES) is proposed to improve the efficiency
... Show MoreRobots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel
... Show MoreVoucher documents have become a very important information carrier in daily lives to be used in many applications. A certain class of people could exploit the trust and indulge in forging or tampering for short or long term benefits unlawfully. This holds a serious threat to the economics and the system of a nation. The aim of this paper is to recognize original voucher document through its contents. Forgery of voucher document could have serious repercussions including financial losses, so the signature, logo and stamp that are used to determine being a genuine or not by using multilevel texture analysis. The proposed method consists of several operations. First, detection and extraction of signature, logo and stamp images from original
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreThe effect of thickness variation on some physical properties of hematite α-Fe2O3 thin films was investigated. An Fe2O3 bulk in the form of pellet was prepared by cold pressing of Fe2O3 powder with subsequent sintering at 800 . Thin films with various thicknesses were obtained on glass substrates by pulsed laser deposition technique. The films properties were characterized by XRD, and FT-IR. The deposited iron oxide thin films showed a single hematite phase with polycrystalline rhombohedral crystal structure .The thickness of films were estimated by using spectrometer to be (185-232) nm. Using Debye Scherrerś formula, the average grain size for the samples was found to be (18-32) nm. Atomic force microscopy indicated that the films had
... Show MoreIn this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.
Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no
... Show More