Preferred Language
Articles
/
joe-238
Satellite Images Classification in Rural Areas Based on Fractal Dimension
...Show More Authors

Fractal geometry is receiving increase attention as a quantitative and qualitative model for natural phenomena description, which can establish an active classification technique when applied on satellite images. In this paper, a satellite image is used which was taken by Quick Bird that contains different visible classes. After pre-processing, this image passes through two stages: segmentation and classification. The segmentation carried out by hybrid two methods used to produce effective results; the two methods are Quadtree method that operated inside Horizontal-Vertical method. The hybrid method is segmented the image into two rectangular blocks, either horizontally or vertically depending on spectral uniformity criterion; otherwise the block is segmented by the quadtree. Then, supervised classification is carried out by means the Fractal Dimension. For each block in the image, the Fractal Dimension was determined and used to classify the target part of image. The supervised classification process delivered five deferent classes were clearly appeared in the target part of image. The supervised classification produced about 97% classification score, which ensures that the adopted fractal feature was able to recognize different classes found in the image with high accuracy level.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
The Role of Satellite Channels in Imparting Behavior to Children from the Point of View of their Parents in Tulkarm City
...Show More Authors

This study aims to identify the role of satellite channels in imparting behavior to children from the point of view of their parents in Tulkarm city. The researcher used a descriptive technique. A sample of (18000) males and females married couples was used above 20 years old in the city of Tulkarm. The study sample size is (201) married couples. It took place in September 2020. The questionnaire was the main tool for collecting data. The study found that the total degree of satellite channels contribution in imparting negative behaviors to children was high, as it reached (72.20%). The total degree of the role of satellite channels in imparting positive behaviors to children was medium, reaching (69.20%). Moreover, the results also indi

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 15 2026
Journal Name
Experimental And Theoretical Nanotechnology
Utilization of multitemporal satellite imagery and forest canopy density (FCD) model for analyzing changes in forest density in Mosul province, Iraq
...Show More Authors

Forest cover in Mosul Province experienced significant changes following the 2014 occupation. These changes can be effectively analyzed using multitemporal remote sensing imagery. This study aims to evaluate the ability of multi-temporal Landsat 8 images and the Forest Canopy Density (FCD) model to detect changes in forest canopy density in a protected forest in Mosul Governorate during the period from 2014 to 2025. The remote sensing data used in this research are Landsat 8 images captured on March 21, 2014, and April 4, 2025. The method employed is FCD modeling, which produces pixel-level canopy density estimates. The results of the FCD model are then used to analyze changes in canopy density following the occupation. The findings of this

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Lark Journal
The role of metaphor in the embodiment of female images (In the novel by Ludmila Ulitskaya "Sincerely Yours Shurik" as model)
...Show More Authors

The research deals with metaphors as being one of the primary means used by Lyudmila Ulitskaya when writing the novel " Sincerely Yours Shurik ", to form diverse and multifaceted collective female images of representatives of the classic psychological patterns presented in the work. This research reflects the results of the study related to the work of Lyudmila Yevkinevna Ulitskaya, an actress of modern Russian prose. The novel "The Sincerely to You Shorek" is one of Ludmila Ulitskaya's creations (the year of writing - 2003), which, like her other works, is distinguished by a unique presentation style, rich vocabulary, lexical and semantic diversity, and a special style of writing. writer. The main objective of the research is to look at th

... Show More
Publication Date
Sat Mar 28 2026
Journal Name
Journal Of Physical Education
Analytical Study of Touch Areas and Preparatory Movements Leading to The Touch in Epee Fencing in The Men's Team Final at The Paris 2024 Paralympics
...Show More Authors

In sports where technical performance is crucial, quantitative analysis methods have evolved to track skill performance using modern training methods and technology. This helps trainers evaluate training methods and detect performance issues. Coaches and athletes know that preliminary movements improve attack accuracy, but the association between motions (strikes, presses, crushes) and target regions (torso, armed arm, head) has not been thoroughly investigated. Lack of studies on Paralympic fencing's targeted contact regions and ambiguity around the most common preliminary actions highlight the research problem. The study examined epee fencers' successful movement sequences in the Paris 2024 Paralympic Games' final bouts and touch success

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 07 2023
Journal Name
Journal Of Educational And Psychological Researches
The Extent of Academic Knowledge in the Colleges of Applied Sciences of the Areas of the National Learning Strategy 2040 in the Sultanate of Oman
...Show More Authors

The study aims to identify the extent the academics in colleges of applied sciences are familiar with the themes of the national strategy of education 2040 in the Sultanate of Oman. The researchers used the descriptive approach, as well as they adopted a questionnaire with five dimensions as a tool for data collection, which was applied to (120) academics. The results showed that the academics of the applied colleges' familiarity with the National Strategy for Education 2040 in the Sultanate of Oman is average. The study also found that there were no statistically significant differences in the academics estimates of the extent of the Colleges of Applied Sciences academics’ familiarity with the themes of the National Education 2040 Str

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
Agitation Negative Social Behaviours in the Talk Shows of the (NRT) Satellite Channel: Research extracted from a master's thesis
...Show More Authors

This research asks what are negative social behaviours in the Kurdistan Region of Iraq (KRI) raised by the talk shows on the (NRT) channel? Furthermore, it aims to identify the most significant themes addressed by talk shows on the (NRT) channel regarding negative social behaviours in the KRI by using the content analysis approach through non-random purposive sampling to understand the dialogue contents that dealt with this subject. This study has reached a set of results: through its talk shows, the (NRT) channel attempts to create a media vision about the spread of negative social behaviours in the KRI and stand up to the dangers associated with these behaviours. At the same time, those programs tried to marginalize the behaviours that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref