Preferred Language
Articles
/
ijp-243
Satellite image classification using proposed singular value decomposition method
...Show More Authors

In this work, satellite images for Razaza Lake and the surrounding area
district in Karbala province are classified for years 1990,1999 and
2014 using two software programming (MATLAB 7.12 and ERDAS
imagine 2014). Proposed unsupervised and supervised method of
classification using MATLAB software have been used; these are
mean value and Singular Value Decomposition respectively. While
unsupervised (K-Means) and supervised (Maximum likelihood
Classifier) method are utilized using ERDAS imagine, in order to get
most accurate results and then compare these results of each method
and calculate the changes that taken place in years 1999 and 2014;
comparing with 1990. The results from classification indicated that
water and hills are decreased, while vegetation, wet land and barren
land are increased for years 1999 and 2014; comparable with 1990.
The classification accuracy was done by number of random points
chosen on the study area in the field work and geographical data then
compared with the classification results, the classification accuracy for
the proposed SVD method are 92.5%, 84.5% and 90% for years
1990,1999,2014, respectivety, while the classification accuracies for
unsupervised classification method based mean value are 92%, 87%
and 91% for years 1990,1999,2014 respectivety.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Sat Jun 01 2013
Journal Name
مجلة كلية بغداد للعلوم الاقتصادية الجامعة
Proposed family speech recognition
...Show More Authors

Speech recognition is a very important field that can be used in many applications such as controlling to protect area, banking, transaction over telephone network database access service, voice email, investigations, House controlling and management ... etc. Speech recognition systems can be used in two modes: to identify a particular person or to verify a person’s claimed identity. The family speaker recognition is a modern field in the speaker recognition. Many family speakers have similarity in the characteristics and hard to identify between them. Today, the scope of speech recognition is limited to speech collected from cooperative users in real world office environments and without adverse microphone or channel impairments.

Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Science,
Monitoring Vegetation Growth of Spectrally Landsat Satellite Imagery ETM+ 7 & TM 5 for Western Region of Iraq by Using Remote Sensing Techniques.
...Show More Authors

Landsat-5 Thematic Mapper (TM) has been imaging the Earth since March 1984 and Landsat-7 Enhanced Thematic Mapper Plus (ETM+) was added to the series of Landsat instruments in April 1999. In this paper the two sensors are used to monitoring the agriculture condition and detection the changing in the area of plant covers, the stability and calibration of the ETM+ has been monitored extensively since launch although it is not monitored for many years, TM now has a similar system in place to monitor stability and calibration. By referring to statistical values for the classification process, the results indicated that the state of vegetation in 1990 was in the proportion of 42.8%, while this percentage rose to 52.5% for the same study area in

... Show More
View Publication
Publication Date
Sat Jul 20 2024
Journal Name
Journal Of Interdisciplinary Mathematics
Elzaki transform decomposition approach to solve Riccati matrix differential equations
...Show More Authors

Elzaki Transform Adomian decomposition technique (ETADM), which an elegant combine, has been employed in this work to solve non-linear Riccati matrix differential equations. Solutions are presented to demonstrate the relevance of the current approach. With the use of figures, the results of the proposed strategy are displayed and evaluated. It is demonstrated that the suggested approach is effective, dependable, and simple to apply to a range of related scientific and technical problems.

Scopus (4)
Scopus
Publication Date
Thu Jan 01 2015
Journal Name
Al–bahith Al–a'alami
News coverage of Arab revolutions in satellite channels An analytical study of the news bulletins in Al - Tijah satellite channel
...Show More Authors

The news media material to any means of mass media, and increasingly

 important in TV; what the associated word and image effects, which do different cover events (political, economic, sports, and social .... etc.) directly from the event site and gather the news and do prepared formulation and arranged within the framework provided by the newsletter, as it requires the viewer to provide the public with information about this news correlated; to achieve the greatest gravity following the shapes and styles and technical fees (Alkraveks) during the submission. What we are witnessing today from technological developments help existing staff to cover the news activity quickly and efficiently prohibitivel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Nov 10 2025
Journal Name
Al–bahith Al–a'alami
Technical Processing of documentary programs in satellite channels
...Show More Authors

The current research dealt with the study and analysis of the documentary
program on RT satellite channel dealt with research in a problem identified
by the researcher in a major question, which is the methods of technical
processing of documentary programs in satellite channels? The goal of
identifying the channel's handling of its documentary programs.
The research is considered descriptive research in which the researcher
used the survey method, the content analysis method to analyze (12)
documentary programs, It was determined by the comprehensive inventory
method within the temporal field of research extending from 1/10/2019 to
29/12/2019.
The researcher has obtained several results, the most important

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Image Compression Using Tap 9/7 Wavelet Transform and Quadtree Coding Scheme
...Show More Authors

This paper is concerned with the design and implementation of an image compression method based on biorthogonal tap-9/7 discrete wavelet transform (DWT) and quadtree coding method. As a first step the color correlation is handled using YUV color representation instead of RGB. Then, the chromatic sub-bands are downsampled, and the data of each color band is transformed using wavelet transform. The produced wavelet sub-bands are quantized using hierarchal scalar quantization method. The detail quantized coefficient is coded using quadtree coding followed by Lempel-Ziv-Welch (LZW) encoding. While the approximation coefficients are coded using delta coding followed by LZW encoding. The test results indicated that the compression results are com

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Semiparametric Bayesian Method with Classical Method for Estimating Systems Reliability using Simulation Procedure
...Show More Authors

               In this research, the semiparametric Bayesian method is compared with the classical  method to  estimate reliability function of three  systems :  k-out of-n system, series system, and parallel system. Each system consists of three components, the first one represents the composite parametric in which failure times distributed as exponential, whereas the second and the third components are nonparametric ones in which reliability estimations depend on Kernel method using two methods to estimate bandwidth parameter h method and Kaplan-Meier method. To indicate a better method for system reliability function estimation, it has be

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Ieee Access
Wrapper and Hybrid Feature Selection Methods Using Metaheuristic Algorithms for English Text Classification: A Systematic Review
...Show More Authors

Feature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall

... Show More
View Publication Preview PDF
Scopus (51)
Crossref (44)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (9)
Scopus Clarivate Crossref