Home New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet transform. The proposed audio compression system consists of the following steps: (1) load digital audio data, (2) transformation (i.e., using bi-orthogonal wavelet or discrete cosine transform) to decompose the audio signal, (3) quantization (depend on the used transform), (4) quantization of the quantized data that separated into two sequence vectors; runs and non-zeroes decomposition to apply the run length to reduce the long-run sequence. Each resulted vector is passed into the entropy encoder technique to implement a compression process. In this paper, two entropy encoders are used; the first one is the lossless compression method LZW and the second one is an advanced version for the traditional shift coding method called the double shift coding method. The proposed system performance is analyzed using distinct audio samples of different sizes and characteristics with various audio signal parameters. The performance of the compression system is evaluated using Peak Signal to Noise Ratio and Compression Ratio. The outcomes of audio samples show that the system is simple, fast and it causes better compression gain. The results show that the DSC encoding time is less than the LZW encoding time.
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThe paper delves into the examination of trauma portrayals in Heather Raffo's “Noura” (2019). Raffo examines the challenges faced by two Iraqi women, Raffo and Maryam, in relation to parenthood following the capture of Iraq by “ISIS”. The paper is concerned with the various depictions of trauma that Raffo accomplishes in the text then delves in the way she cocooned her characters’ identity in order to recover their traumas. Initially, Noura is a trauma tale, illustrating the recurrent and repetitive nature of trauma from mother to daughter. The narrative reflects the interactions and dynamics between the mother and daughter and their function as substitutes for memory and recounting personal narratives. Moreover, examin
... Show MoreThe study scrutinises intermingled relations between children literature and some ecological issues. Such interwoven relationships would be highly recommended to encourage children to explore and identify themselves with nature from early ages to avoid facing an extreme experience later on. The research limits its scope to two novels Suzanne Collins’ (1962) The Hunger Games trilogy (2003-2007) and William Golding’s (1911-1993) Lord of the Flies (1954), and both novels have no direct connections with Ecology and the Eco-consciousness, yet it offers an insightful description about Man’s experience with Nature. Moreover, it raises serious moral questions, raises awareness, heals wounds and suggests solutions for the problems th
... Show MoreAbstract This paper is devoted to introduce weak and strong forms of fibrewise fuzzy u-topological spaces, namely the fibrewise fuzzy q-u-topological spaces, weakly fibrewise fuzzy q-u-topological spaces and strongly fibrewise fuzzy q-utopological spaces. Also, Several characterizations and properties of this class are also given as well. Finally, we focused on studying the relationship between weakly fibrewise fuzzy q-u-topological spaces and strongly fibrewise fuzzy q-utopological spaces.
As a result of the increase in wireless applications, this led to a spectrum problem, which was often a significant restriction. However, a wide bandwidth (more than two-thirds of the available) remains wasted due to inappropriate usage. As a consequence, the quality of the service of the system was impacted. This problem was resolved by using cognitive radio that provides opportunistic sharing or utilization of the spectrum. This paper analyzes the performance of the cognitive radio spectrum sensing algorithm for the energy detector, which implemented by using a MATLAB Mfile version (2018b). The signal to noise ratio SNR vs. Pd probability of detection for OFDM and SNR vs. BER with CP cyclic prefix with energy dete
... Show MoreExperimental and numerical investigations of the centrifugal pump performance at non-cavitating and cavitating flow conditions were carried out in the present study. Experiments were performed by applying a vacuum to a closed-loop system to investigate the effects of the net positive suction head available (NPSHa), flow rate, water temperature and pump speed on the centrifugal pump performance. Accordingly, many of the important parameters concerning cavitation phenomenon were calculated. Also, the noise which is accompanied by cavitation was measured. Numerical analysis was implemented for two phase flow (the water and its vapor) using a 2-D simulation by ANSYS FLUENT software to investigate the internal flow of centrifugal pump under c
... Show MoreThe basic concepts of some near open subgraphs, near rough, near exact and near fuzzy graphs are introduced and sufficiently illustrated. The Gm-closure space induced by closure operators is used to generalize the basic rough graph concepts. We introduce the near exactness and near roughness by applying the near concepts to make more accuracy for definability of graphs. We give a new definition for a membership function to find near interior, near boundary and near exterior vertices. Moreover, proved results, examples and counter examples are provided. The Gm-closure structure which suggested in this paper opens up the way for applying rich amount of topological facts and methods in the process of granular computing.
Etodolac is choice of drug for pain and inflammation but has major side effects of gastric ulcers that are due to free carboxylic group. Etodolac belongs to the chemical class of non-selective COX-inhibitor but preferentially COX-2 inhibitor. Here the ester linked mutual prodrugs of etodolac with phytophenols like vanillin, carvacrol, umbelliferone, guaiacol, sesamol and syringaldehyde were synthesized. All the prodrugs were characterized by IR-spectroscopy, 1H-NMR, 13C-NMR and mass spectrometry. Among the synthesized prodrugs, the Eto-van, Eto-umbe, Eto-sesa and Eto-syr showed improved analgesic and anti-inflammatory activity compared to etodolac. All the synthesized prodrugs showed less ulcerogenic side effects co
... Show MoreThe current research deals with practical studies that explain to the Iraqi consumer multiple instances about the phenomenon of water hammer which occur in the water pipeline operating with pressure. It concern a practical study of the characteristics of this phenomenon and economically harmful to the consumer the same time. Multiple pipe fittings are used aimed to reduce this phenomenon and its work as alternatives to the manufactured arresters that used to avoid water hammer in the sanitary installations, while the consumer did not have any knowledge as to the non-traded for many reasons, including the water pressure decreases in the networks and the use of consumer pumps to draw water directly from the network. Study found a numbe
... Show More