Change detection is a technology ascertaining the changes of
specific features within a certain time Interval. The use of remotely
sensed image to detect changes in land use and land cover is widely
preferred over other conventional survey techniques because this
method is very efficient for assessing the change or degrading trends
of a region. In this research two remotely sensed image of Baghdad
city gathered by landsat -7and landsat -8 ETM+ for two time period
2000 and 2014 have been used to detect the most important changes.
Registration and rectification the two original images are the first
preprocessing steps was applied in this paper. Change detection using
NDVI subtractive has been computed, subtractive between the bands
of the two images and the ratio of the red to blue bands was also
computed. Change detection mask using minimum distance
classification or detection after classification have be also used to
compute the changes between the resultant classes, many statistical
properties of the original and process image have been illustrated in
this research
سها علي حسين, هويدة إسماعيل إبراهيم, Journal of Physical Education, 2017 - Cited by 1
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
ABSTRICT:
This study is concerned with the estimation of constant and time-varying parameters in non-linear ordinary differential equations, which do not have analytical solutions. The estimation is done in a multi-stage method where constant and time-varying parameters are estimated in a straight sequential way from several stages. In the first stage, the model of the differential equations is converted to a regression model that includes the state variables with their derivatives and then the estimation of the state variables and their derivatives in a penalized splines method and compensating the estimations in the regression model. In the second stage, the pseudo- least squares method was used to es
... Show MoreWe propose two simple, rapid, and convenient spectrophotometric methods which are described for the determination of cephalexin in bulk and its pharmaceutical preparations. They are based on the measurement of the flame atomic emission of potassium ion (in the first method) and colorimetric determination of the green colored solution at 610 nm formed after the reaction of cephalexin with potassium permanganate as an oxidant agent (in the second method) in basic medium. The working conditions of the methods are investigated and optimized. Beer's law plot shows a good correlation in the concentration range of 5-40?g ml-1. The detection limits are 2.573,2.814 ?g ml-1 for the flame emission photometric method and 1.844,2.016 ?g ml-1 for colo
... Show MoreIn this work, the possibility to use new suggested carriers (D= Aspirin, Ibuprofen, Paracetamol, Tramal) is discussed for diclofenac drug (voltarine) by using quantum mechanics calculations. The calculation methods (PM3) and (DFT) have been used for determination the reaction path of (O-D) bond rupture energies. Different groups of drugs as a carrier for diclofenac prodrugs (in a vacuum) have been used; at their optimized geometries. The calculations included the geometrical structure and some of the physical properties, in addition to the toxicity, biological activity, and NLO properties of the prodrugs, investigated using HF method. The calculations were done by Gaussian 09 program. The comparison was made for total energies of reactan
... Show MoreChromatographic and spectrophotometric methods for the estimation of mebendazole in
pharmaceutical products were developed. The flow injection method was based on the oxidation of
mebendazole by a known excess of sodium hypochlorite at pH=9.5. The excess sodium hypochlorite is then
reacted with chloranilic acid (CAA) to bleach out its color. The absorbance of the excess CAA was recorded
at 530 nm. The method is fast, simple, selective, and sensitive. The chromatographic method was carried out
on a Varian C18 column. The mobile phase was a mixture of acetonitrile (ACN), methanol (MeOH), water
and triethylamine (TEA), (56% ACN, 20% MeOH, 23.5% H2O, 0.5% TEA, v/v), adjusted to pH = 3.0 with
1.0 M hy
Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show MoreThis paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.
Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different
... Show More