Fractal geometry is receiving increase attention as a quantitative and qualitative model for natural phenomena description, which can establish an active classification technique when applied on satellite images. In this paper, a satellite image is used which was taken by Quick Bird that contains different visible classes. After pre-processing, this image passes through two stages: segmentation and classification. The segmentation carried out by hybrid two methods used to produce effective results; the two methods are Quadtree method that operated inside Horizontal-Vertical method. The hybrid method is segmented the image into two rectangular blocks, either horizontally or vertically depending on spectral uniformity criterion; otherwise the block is segmented by the quadtree. Then, supervised classification is carried out by means the Fractal Dimension. For each block in the image, the Fractal Dimension was determined and used to classify the target part of image. The supervised classification process delivered five deferent classes were clearly appeared in the target part of image. The supervised classification produced about 97% classification score, which ensures that the adopted fractal feature was able to recognize different classes found in the image with high accuracy level.
This study aims to identify the role of satellite channels in imparting behavior to children from the point of view of their parents in Tulkarm city. The researcher used a descriptive technique. A sample of (18000) males and females married couples was used above 20 years old in the city of Tulkarm. The study sample size is (201) married couples. It took place in September 2020. The questionnaire was the main tool for collecting data. The study found that the total degree of satellite channels contribution in imparting negative behaviors to children was high, as it reached (72.20%). The total degree of the role of satellite channels in imparting positive behaviors to children was medium, reaching (69.20%). Moreover, the results also indi
... Show MoreForest cover in Mosul Province experienced significant changes following the 2014 occupation. These changes can be effectively analyzed using multitemporal remote sensing imagery. This study aims to evaluate the ability of multi-temporal Landsat 8 images and the Forest Canopy Density (FCD) model to detect changes in forest canopy density in a protected forest in Mosul Governorate during the period from 2014 to 2025. The remote sensing data used in this research are Landsat 8 images captured on March 21, 2014, and April 4, 2025. The method employed is FCD modeling, which produces pixel-level canopy density estimates. The results of the FCD model are then used to analyze changes in canopy density following the occupation. The findings of this
... Show MoreThe research deals with metaphors as being one of the primary means used by Lyudmila Ulitskaya when writing the novel " Sincerely Yours Shurik ", to form diverse and multifaceted collective female images of representatives of the classic psychological patterns presented in the work. This research reflects the results of the study related to the work of Lyudmila Yevkinevna Ulitskaya, an actress of modern Russian prose. The novel "The Sincerely to You Shorek" is one of Ludmila Ulitskaya's creations (the year of writing - 2003), which, like her other works, is distinguished by a unique presentation style, rich vocabulary, lexical and semantic diversity, and a special style of writing. writer. The main objective of the research is to look at th
... Show MoreIn sports where technical performance is crucial, quantitative analysis methods have evolved to track skill performance using modern training methods and technology. This helps trainers evaluate training methods and detect performance issues. Coaches and athletes know that preliminary movements improve attack accuracy, but the association between motions (strikes, presses, crushes) and target regions (torso, armed arm, head) has not been thoroughly investigated. Lack of studies on Paralympic fencing's targeted contact regions and ambiguity around the most common preliminary actions highlight the research problem. The study examined epee fencers' successful movement sequences in the Paris 2024 Paralympic Games' final bouts and touch success
... Show MoreThe study aims to identify the extent the academics in colleges of applied sciences are familiar with the themes of the national strategy of education 2040 in the Sultanate of Oman. The researchers used the descriptive approach, as well as they adopted a questionnaire with five dimensions as a tool for data collection, which was applied to (120) academics. The results showed that the academics of the applied colleges' familiarity with the National Strategy for Education 2040 in the Sultanate of Oman is average. The study also found that there were no statistically significant differences in the academics estimates of the extent of the Colleges of Applied Sciences academics’ familiarity with the themes of the National Education 2040 Str
... Show MoreThis research asks what are negative social behaviours in the Kurdistan Region of Iraq (KRI) raised by the talk shows on the (NRT) channel? Furthermore, it aims to identify the most significant themes addressed by talk shows on the (NRT) channel regarding negative social behaviours in the KRI by using the content analysis approach through non-random purposive sampling to understand the dialogue contents that dealt with this subject. This study has reached a set of results: through its talk shows, the (NRT) channel attempts to create a media vision about the spread of negative social behaviours in the KRI and stand up to the dangers associated with these behaviours. At the same time, those programs tried to marginalize the behaviours that
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables