يعد التقطيع الصوري من الاهداف الرئيسة والضرورية في المعالجات الصورية للصور الرقمية، فهو يسعى الى تجزئة الصور المدروسة الى مناطق متعددة اكثر نفعاً تلخص فيها المناطق ذات الافادة لصور الاقمار الصناعية، وهي صور متعددة الاطياف ومجهزة من الاقمار الصناعية باستخدام مبدأ الاستشعار عن بعد والذي اصبح من المفاهيم المهمة التي تُعتمد تطبيقاته في اغلب ضروريات الحياة اليومية، وخاصة بعد التطورات المتسارعة التي شهدتها ميادين الحياة المختلفة والتي كثيراً منها طرقت بابها خوارزميات وتقنيات البرمجيات، فهذه الصور تعد ضرورية جداٌ لتمكيننا من دراسة طيف واسع من الاهداف في العديد من الجوانب العلمية، في هذا البحث استخدمت خوارزمية التحليل العنقودي غير الهرمية كطريقة للتقطيع الصوري (شطر ودمج المناطق) بهدف عرض اهمية استخدام الاساليب الاحصائية في مهام المعالجة الصورية مثل التقطيع الصوري، حيث اعتمد على تقنية (K-Means) لتنفيذ هذه المهمة، وقد طبقت خوارزمية هذه التقنية على صورة اقمار صناعية متعددة الاطياف لمشهد غربي العراق، حيث اظهرت النتائج مدى مرونة هذه الخوارزمية في التعامل مع التفاوت في اضاءة العناصر الصورية للصورة الملونة وكفاءة تكوينها لمناطق العناقيد المتكونة من مجاميع من العناصر الصورية المتجانسة في درجة شدة اضاءتها، واخيراً قدرة هذه الخوارزمية على اعطاء صور تتميز بجودتها والتي قيست على وفق مقياس ارتفاع اشارة نسبة الضوضاء (Peak Signal to Noise Ratio (PSNR)) لقياس جودة الصورة.
The non static chain is always the problem of static analysis so that explained some of theoretical work, the properties of statistical regression analysis to lose when using strings in statistic and gives the slope of an imaginary relation under consideration. chain is not static can become static by adding variable time to the multivariate analysis the factors to remove the general trend as well as variable placebo seasons to remove the effect of seasonal .convert the data to form exponential or logarithmic , in addition to using the difference repeated d is said in this case it integrated class d. Where the research contained in the theoretical side in parts in the first part the research methodology ha
... Show MorePeer-Reviewed Journal
Heuristic approaches are traditionally applied to find the optimal size and optimal location of Flexible AC Transmission Systems (FACTS) devices in power systems. Genetic Algorithm (GA) technique has been applied to solve power engineering optimization problems giving better results than classical methods. This paper shows the application of GA for optimal sizing and allocation of a Static Compensator (STATCOM) in a power system. STATCOM devices used to increase transmission systems capacity and enhance voltage stability by regulate the voltages at its terminal by controlling the amount of reactive power injected into or absorbed from the power system. IEEE 5-bus standard system is used as an example to illustrate the te
... Show MoreThe objective of the current research is to find an optimum design of hybrid laminated moderate thick composite plates with static constraint. The stacking sequence and ply angle is required for optimization to achieve minimum deflection for hybrid laminated composite plates consist of glass and carbon long fibers reinforcements that impeded in epoxy matrix with known plates dimension and loading. The analysis of plate is by adopting the first-order shear deformation theory and using Navier's solution with Genetic Algorithm to approach the current objective. A program written with MATLAB to find best stacking sequence and ply angles that give minimum deflection, and the results comparing with ANSYS.
Objecte The study aims to test the effect of using the appropriate quantitative method of demand forecasting in improving the performance of supply chain of the aviation fuel product ( The study sample), One of the products of the Doura refinery (The study site), By testing a set of quantitative methods of demand forecasting using forecasting error measurements, and choosing the least faulty, most accurate and reliable method and adept it in the building chain.
Is the study of problem through a starting with the fol
... Show MoreRecently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreAbstract
This study aimed to identify the business risks using the approach of the client strategy analysis in order to improve the efficiency and effectiveness of the audit process. A study of business risks and their impact on the efficiency and effectiveness of the audit process has been performed to establish a cognitive framework of the main objective of this study, in which the descriptive analytical method has been adopted. A survey questionnaire has been developed and distributed to the targeted group of audit firms which have profession license from the Auditors Association in the Gaza Strip (63 offices). A hundred questionnaires have been distributed to the study sample of which, a total of 84 where answered and
... Show MoreBootstrap is one of an important re-sampling technique which has given the attention of researches recently. The presence of outliers in the original data set may cause serious problem to the classical bootstrap when the percentage of outliers are higher than the original one. Many methods are proposed to overcome this problem such Dynamic Robust Bootstrap for LTS (DRBLTS) and Weighted Bootstrap with Probability (WBP). This paper try to show the accuracy of parameters estimation by comparison the results of both methods. The bias , MSE and RMSE are considered. The criterion of the accuracy is based on the RMSE value since the method that provide us RMSE value smaller than other is con
... Show More