Preferred Language
Articles
/
joe-443
Improved Automatic Registration Adjustment of Multi-source Remote Sensing Datasets
...Show More Authors

Registration techniques are still considered challenging tasks to remote sensing users, especially after enormous increase in the volume of remotely sensed data being acquired by an ever-growing number of earth observation sensors. This surge in use mandates the development of accurate and robust registration procedures that can handle these data with varying geometric and radiometric properties. This paper aims to develop the traditional registration scenarios to reduce discrepancies between registered datasets in two dimensions (2D) space for remote sensing images. This is achieved by designing a computer program written in Visual Basic language following two main stages: The first stage is a traditional registration process by defining a set of control point pairs using manual selection, then comput the parameters of global affine transformation model to match them and resample the images. The second stage included matching process refinement by determining the shift value in control points (CPs) location depending on radiometric similarity measure. Then shift map technique was adjusted to adjust the process using 2nd order polynomial transformation function. This function has chosen after conducting statistical analyses, comparing between the common transformation functions (similarity, affine, projection and 2nd order polynomial). The results showed that the developed approach reduced the root mean square error (RMSE) of registration process and decreasing the discrepancies between registered datasets with 60%, 57% and 48% respectively for each one of the three tested datasets.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Global NAVIGATION Satellite System Contribution for Observing the Tectonic Plate Movements: Status and Perspectives
...Show More Authors

The long-term monitoring of land movements represents the most successful application of the Global Navigation Satellite System (GNSS), particularly the Global Positioning System. However, the application of long term monitoring of land movements depends on the availability of homogenous and consistent daily position time series of stations over a period of time. Such time series can be produced very efficiently by using Precise Point Positioning and Double Difference techniques based on particular sophisticated GNSS processing softwares. Nonetheless, these rely on the availability of GNSS products which are precise satellite orbit and clock, and Earth orientation parameters. Unfortunately, several changes and modifications have been mad

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 05 2025
Journal Name
مجلة اللغة الروسية في الخارج
Types of Comparisons and Their Use in Russian and Arabic: A Comparative Analysis-انواع التشبيه وطرق استخدامه في اللغتين الروسية والعربية :تحليل مقارن
...Show More Authors

The article provides a comparative analysis of comparisons in Russian and Arabic, aimed at identifying their structural, typological, and functional-pragmatic features. The study is based on a systematic approach to the analysis of linguistic means of expressing comparisons in two differ- ent linguistic cultures. The article analyzes the main structural components of comparisons, their classification, and their cognitive and aesthetic functions. The results of the study demonstrate the deep cultural conditioning of comparative constructions and their important role in representing the specific features of the respective linguistic cultures.

Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Copulas in Classical Probability Sense
...Show More Authors

               Copulas are simply equivalent structures to joint distribution functions. Then, we propose modified structures that depend on classical probability space and concepts with respect to copulas. Copulas have been presented in equivalent probability measure forms to the classical forms in order to examine any possible modern probabilistic relations. A probability of events was demonstrated as elements of copulas instead of random variables with a knowledge that each probability of an event belongs to [0,1]. Also, some probabilistic constructions have been shown within independent, and conditional probability concepts. A Bay's probability relation and its pro

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Dec 31 2014
Journal Name
Iraqi Journal For Computers And Informatics
Gate Control System for New Iraqi License Plate
...Show More Authors

This paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
On Finitely Null-additive and Finitely Weakly Null-additive Relative to the σ–ring
...Show More Authors

     This article introduces the concept of finitely null-additive set function relative to the σ– ring and many properties of this concept have been discussed. Furthermore, to introduce and study the notion of finitely weakly null-additive set function relative to the σ– ring as a generalization of some concepts such as measure, countably additive, finitely additive, countably null-additive, countably weakly null-additive and finitely null-additive. As the first result, it has been proved that every finitely null-additive is a finitely weakly null-additive. Finally, the paper introduces a study of the concept of outer measure as a stronger form of finitely weakly null-additive.

View Publication Preview PDF
Scopus (7)
Scopus Clarivate Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Advances In Science And Technology Research Journal
Vein Biometric Recognition Methods and Systems: A Review
...Show More Authors

View Publication
Scopus (16)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Sep 03 2017
Journal Name
Baghdad Science Journal
Scale-Invariant Feature Transform Algorithm with Fast Approximate Nearest Neighbor
...Show More Authors

There is a great deal of systems dealing with image processing that are being used and developed on a daily basis. Those systems need the deployment of some basic operations such as detecting the Regions of Interest and matching those regions, in addition to the description of their properties. Those operations play a significant role in decision making which is necessary for the next operations depending on the assigned task. In order to accomplish those tasks, various algorithms have been introduced throughout years. One of the most popular algorithms is the Scale Invariant Feature Transform (SIFT). The efficiency of this algorithm is its performance in the process of detection and property description, and that is due to the fact that

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
A Novel Gravity ‎Optimization Algorithm for Extractive Arabic Text Summarization
...Show More Authors

 

An automatic text summarization system mimics how humans summarize by picking the most ‎significant sentences in a source text. However, the complexities of the Arabic language have become ‎challenging to obtain information quickly and effectively. The main disadvantage of the ‎traditional approaches is that they are strictly constrained (especially for the Arabic language) by the ‎accuracy of sentence feature ‎functions, weighting schemes, ‎and similarity calculations. On the other hand, the meta-heuristic search approaches have a feature tha

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Document retrieval using term term frequency inverse sentence frequency weighting scheme
...Show More Authors

The need for an efficient method to find the furthermost appropriate document corresponding to a particular search query has become crucial due to the exponential development in the number of papers that are now readily available to us on the web. The vector space model (VSM) a perfect model used in “information retrieval”, represents these words as a vector in space and gives them weights via a popular weighting method known as term frequency inverse document frequency (TF-IDF). In this research, work has been proposed to retrieve the most relevant document focused on representing documents and queries as vectors comprising average term term frequency inverse sentence frequency (TF-ISF) weights instead of representing them as v

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref