During the two last decades ago, audio compression becomes the topic of many types of research due to the importance of this field which reflecting on the storage capacity and the transmission requirement. The rapid development of the computer industry increases the demand for audio data with high quality and accordingly, there is great importance for the development of audio compression technologies, lossy and lossless are the two categories of compression. This paper aims to review the techniques of the lossy audio compression methods, summarize the importance and the uses of each method.
Image Fusion is being used to gather important data from such an input image array and to place it in a single output picture to make it much more meaningful & usable than either of the input images. Image fusion boosts the quality and application of data. The accuracy of the image that has fused depending on the application. It is widely used in smart robotics, audio camera fusion, photonics, system control and output, construction and inspection of electronic circuits, complex computer, software diagnostics, also smart line assembling robots. In this paper provides a literature review of different image fusion techniques in the spatial domain and frequency domain, such as averaging, min-max, block substitution, Intensity-Hue-Saturation(IH
... Show MoreDuring the course of fixed orthodontic therapy, patients should be instructed to eat specific food stuffs and beverages in order to maintain good health for the dentition and supporting structures and prevent frequent attachment debonding that prolong the treatment duration. After searching and collecting articles from 1930 till July 2021, the current review was prepared to emphasize various types of foods that should be taken during the course of fixed orthodontic therapy and to explain the effect of various food stuffs and beverages on the growth and development of craniofacial structures, tooth surfaces, root resorption, tooth movement, retention and stability after orthodontic treatment and the effect on the components of fixed ortho
... Show MoreIn this paper the chain length of a space of fuzzy orderings is defined, and various properties of this invariant are proved. The structure theorem for spaces of finite chain length is proved. Spaces of Fuzzy Orderings Throughout X = (X,A) denoted a space of fuzzy orderings. That is, A is a fuzzy subgroup of abelian group G of exponent 2. (see [1] (i.e. x 2 = 1,  x  G), and X is a (non empty) fuzzy subset of the character group ï£ (A) = Hom(A,{1,–1}) satisfying: 1. X is a fuzzy closed subset of ï£ (A). 2.  an element e  A such that ï³(e) = – 1  ï³ ïƒŽ X. 3. Xïž :={a  A\ ï³(a) = 1  ï³ ïƒŽ X} = 1. 4. If f and g are forms over A and if x  D(
... Show MoreThe research aimed to identify the effects of the modern of technology on translating the media term from English language to Arabic. and try to identify the use of the impact of foreign media terminologies on the Arabic media term, and to know the effect of the translation process on Arabic media terminologies.
This research is considered an analytical study by using survey study for 111 items and the results for the study as following:
1.High percentage of the (use of foreign terms work to low the level of production) was (68.13%) and average 3.55
2.The percentage of (The multiplicity of translation of the foreign term into Arabic effects on the opinions and cognitive ideas of the Arab researcher and affects the
... Show MoreSteganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography
Synthesis and study liquid crystalline properties of novel Benzimidazol-8-hydroxyquinoline complexes by reaction of a-Chloro acetic acid with 3,3'-dimethylbiphenyl-4,4'-diamine in 10% aqueous sodium hydroxide to synthesized compound [I] then the later compound reacted with o-phenylenediamine in 4N Hydrochloric acid to synthesized compound N4,N4'-bis((1H-benzo[d]imidazol-2-yl)methyl)-3,3'-dimethyl-[1,1'-biphenyl]-4,4'-diamine =[II] . While the complexes [III],[IV],[V],[VI] and [VII] synthesized from reacted compound [II] , 8-hydroxyquinoline with metal(II) salts { M= Mn(II), Fe(II), Ni (II), Cu(II),and Zn(II)}. Newly synthesized compounds were characterized using melting points, FT-IR, UV-Vis spectra, and some of them 1H NMR spectroscopy. ma
... Show MoreNature and natural beauty have always been the source of inspiration for poets and mystics. For them, nature is one of the most recurrent and celebrated themes. It is a significant symbol of the beauty, righteousness and freshness they are looking for. For religious and mystical poets, it is a reference to God, his beauty, and splendour. Comparing it with the scripture, Thomas Ryan, a Catholic priest and a mystical writer, says ''The Bible is the 'small book', the world of nature is the 'big book'. Both reveal the Creator.''1
For Muslim mystics, God does exist everywhere as the Qur'an states: ''Wherever (Whithersoever) you turn, there is God's face” (Chapter (Surah): 2
... Show MoreThe software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show More