Many recent satellite image compression methods depends on removing the spectral and spatial redundancies within image only , such these methods known as intra-frame(image) coding such as predictive and transformed based techniques , but these contributions needs a hard work in order to improve the compression performance also most of them are applied on individual data. The other trend is to exploit the temporal redundancy between the successive satellite images captured for the same area from different views, different sensors, or at different times, which will be much correlated and removing this redundancy will improve the compression performance and this principle known as inter-frame(image) coding .In this paper, a latest powerful method for compressing sequences of satellite images using inter-frame coding concept with compression method (JPEG) has been presented to satisfy higher compression performance while keeping images quality as well as preservation of significant image details. The experimented results show that the proposed method outperformed many of lossy methods including JPEG.
In this work, satellite images classification for Al Chabaish marshes and the area surrounding district in (Dhi Qar) province for years 1990,2000 and 2015 using two software programming (MATLAB 7.11 and ERDAS imagine 2014) is presented. Proposed supervised classification method (Modified Vector Quantization) using MATLAB software and supervised classification method (Maximum likelihood Classifier) using ERDAS imagine have been used, in order to get most accurate results and compare these methods. The changes that taken place in year 2000 comparing with 1990 and in year 2015 comparing with 2000 are calculated. The results from classification indicated that water and vegetation are decreased, while barren land, alluvial soil and shallow water
... Show MoreAction films employ many artistic and literary elements that contribute greatly to building the general meaning of the film and push the wheel of the film forward. The element of mystery and suspense is used as two basic elements in action films. The cinematic language in action films depends on global coding, which is not models as it might be. It is based on logic, rather as units that aspire to morphology and not their homogeneity as the physical sense, but as the logical harmony of interpretive authority and enlightenment and in action films as a field of communication and a field in its origin in which the signifier contrasts with the perceptions of the meaning and in it takes a certain number of units preventing each other and thro
... Show MoreIn this study, the first kind Bessel function was used to solve Kepler equation for an elliptical orbiting satellite. It is a classical method that gives a direct solution for calculation of the eccentric anomaly. It was solved for one period from (M=0-360)° with an eccentricity of (e=0-1) and the number of terms from (N=1-10). Also, the error in the representation of the first kind Bessel function was calculated. The results indicated that for eccentricity of (0.1-0.4) and (N = 1-10), the values of eccentric anomaly gave a good result as compared with the exact solution. Besides, the obtained eccentric anomaly values were unaffected by increasing the number of terms (N = 6-10) for eccentricities (0.8 and 0.9). The Bessel
... Show MoreThis research is based on interaction of two most important variables to the business organizations in the current era , these two variables are (marketing orientation and quality of service), this research is trying to urge the service organizations to reconsider the mechanisms adopted in the formulation of its plans, It was the application of research in Korek Telecom and Asia Cell Telecom as a sector of service active and important in the business sector in Iraq, the information was obtained through the design of the Likert questionnaire , it was distributed (92) questionnaire , (50) for the company Korek Telecom and (42) of the Asia-Cell and represent research population sample
... Show MoreQuality control charts are limited to controlling one characteristic of a production process, and it needs a large amount of data to determine control limits to control the process. Another limitation of the traditional control chart is that it doesn’t deal with the vague data environment. The fuzzy control charts work with the uncertainty that exists in the data. Also, the fuzzy control charts investigate the random variations found between the samples. In modern industries, productivity is often of different designs and a small volume that depends on the market need for demand (short-run production) implemented in the same type of machines to the production units. In such cases, it is difficult to determine the contr
... Show MoreSeeking pharmacist advice about minor ailments is a common practice among Iraqi patients because such advice is free and quick. Unfortunately, the assessment and management of minor ailments by Iraqi pharmacists were inappropriate. Therefore, this study aimed to develop a model for a mobile application that can assist community pharmacists in the diagnosis and management of minor ailments.
The scientific content of the application was based on the information in the symptoms in the pharmacy and British Nati
The research dealt with two variables first in the field of human resources represented by the empowerment of workers and second in operations through improved process in the framework of standards Quality Award European containing nine basic criteria (Leadership, Strategy, partnerships and resources, the results of the individuals, the results of the customer, the results of the community), including human resources and operations has been selected and the Ministry of Industry and Minerals as a community to search , which covered most of the industrial sectors of Iraq through the selection of a single company of every industrial sector and thus became the research sample (6 ) industrial companies in addition to the C
... Show MoreImage compression plays an important role in reducing the size and storage of data while increasing the speed of its transmission through the Internet significantly. Image compression is an important research topic for several decades and recently, with the great successes achieved by deep learning in many areas of image processing, especially image compression, and its use is increasing Gradually in the field of image compression. The deep learning neural network has also achieved great success in the field of processing and compressing various images of different sizes. In this paper, we present a structure for image compression based on the use of a Convolutional AutoEncoder (CAE) for deep learning, inspired by the diversity of human eye
... Show MoreIn this research, an analysis for the standard Hueckel edge detection algorithm behaviour by using three dimensional representations for the edge goodness criterion is presents after applying it on a real high texture satellite image, where the edge goodness criterion is analysis statistically. The Hueckel edge detection algorithm showed a forward exponential relationship between the execution time with the used disk radius. Hueckel restrictions that mentioned in his papers are adopted in this research. A discussion for the resultant edge shape and malformation is presented, since this is the first practical study of applying Hueckel edge detection algorithm on a real high texture image containing ramp edges (satellite image).
In every system of security, to keep important data confidential, we need a high degree of protection. Steganography can be defined as a way of sending confidential texts through a secure medium of communications as well as protecting the information during the process of transmission. Steganography is a technology that is used to protect users' security and privacy. Communication is majorly achieved using a network through SMS, e-mail, and so on. The presented work suggested a technology of text hiding for protecting secret texts with Unicode characters. The similarities of glyphs provided invisibility and increased the hiding capacity. In conclusion, the proposed method succeeded in securing confidential data and achieving high p
... Show More