Home New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet transform. The proposed audio compression system consists of the following steps: (1) load digital audio data, (2) transformation (i.e., using bi-orthogonal wavelet or discrete cosine transform) to decompose the audio signal, (3) quantization (depend on the used transform), (4) quantization of the quantized data that separated into two sequence vectors; runs and non-zeroes decomposition to apply the run length to reduce the long-run sequence. Each resulted vector is passed into the entropy encoder technique to implement a compression process. In this paper, two entropy encoders are used; the first one is the lossless compression method LZW and the second one is an advanced version for the traditional shift coding method called the double shift coding method. The proposed system performance is analyzed using distinct audio samples of different sizes and characteristics with various audio signal parameters. The performance of the compression system is evaluated using Peak Signal to Noise Ratio and Compression Ratio. The outcomes of audio samples show that the system is simple, fast and it causes better compression gain. The results show that the DSC encoding time is less than the LZW encoding time.
This research aims at studying the relation between fair value and the Financial Reports Quality to achieve a number of aims such as :-
1- Throw light on the problems of the measurement that depends on the historic cost as it paves the way towards the method of the fair value in the accounting measurement.
2-Give a general definition for fair value in the accounting via analyzing the theoretical aspects that relates the subject and the scientific bases on which the relating accounting treatment depend.
3- Exhibit the characteristics that could be added by the fair value to the accounting Information .
The study problem is summarized in that the e
... Show MorePhotocatalytic degradation of methylene blue was studied using CdS and ZnS as catalyst. The photocatalytic activity of the specimen was studied by exposing to UV-radiation. The result shows that the degradation efficiency of the dye for CdS micro-particles was 92% after 7 hours and for ZnS micro-particles was 88.29% for the same time interval.
Construction contractors usually undertake multiple construction projects simultaneously. Such a situation involves sharing different types of resources, including monetary, equipment, and manpower, which may become a major challenge in many cases. In this study, the financial aspects of working on multiple projects at a time are addressed and investigated. The study considers dealing with financial shortages by proposing a multi-project scheduling optimization model for profit maximization, while minimizing the total project duration. Optimization genetic algorithm and finance-based scheduling are used to produce feasible schedules that balance the finance of activities at any time w
Text categorization refers to the process of grouping text or documents into classes or categories according to their content. Text categorization process consists of three phases which are: preprocessing, feature extraction and classification. In comparison to the English language, just few studies have been done to categorize and classify the Arabic language. For a variety of applications, such as text classification and clustering, Arabic text representation is a difficult task because Arabic language is noted for its richness, diversity, and complicated morphology. This paper presents a comprehensive analysis and a comparison for researchers in the last five years based on the dataset, year, algorithms and the accu
... Show MoreRemote sensing is a source of up-to-date information. The present study relied on various approaches for gathering information, including descriptive, quantitative and quantitative analytical processes. Particularly, we conducted the analysis of the satellite data ETM + of the satellite Landsat7 and the digital models of Digital Elevation Model of SRTM using ArcGIS9.2. The model depends on primary mathematical equations and constitutes an essential base for GIS applications that rely on data, computer, and software, performing the processes of data entry, analysis and processing. This paper deals with the geomorphological characteristics of a selected study area in Kirkuk province. The cha
... Show MoreOver the years, the prediction of penetration rate (ROP) has played a key rule for drilling engineers due it is effect on the optimization of various parameters that related to substantial cost saving. Many researchers have continually worked to optimize penetration rate. A major issue with most published studies is that there is no simple model currently available to guarantee the ROP prediction.
The main objective of this study is to further improve ROP prediction using two predictive methods, multiple regression analysis (MRA) and artificial neural networks (ANNs). A field case in SE Iraq was conducted to predict the ROP from a large number of parame
Recently, much secured data has been sent across the internet and networks. Steganography is very important because it conceals secure data in images, texts, audios, protocols, videos, or other mediums. Video steganography is the method of concealing data in frames of video format. A video is a collection of frames or images used for hidden script messages. This paper proposes a technique to encrypt secret messages using DNA and a 3D chaotic map in video frames using the raster method. This technique uses three steps: Firstly, converting video frames into raster to extract features from each frame. Secondly, encryption of secret messages using encoded forms of DNA bases, inverse/inverse complements of DNA, a
... Show MoreThe importance of social exclusion lies in the psychological problems that cause problems in social relations and mental-physical health. For this reason, the researcher set three goals for the current research: identifying the level of social exclusion among people infected with the Coronavirus. The incubation period of the virus. Social exclusion and its relationship to the duration of incubation of the disease among people infected with the Coronavirus. The result showed that the research sample does not suffer from social exclusion. The mean value for the period from
(8-14) days is the highest value followed by the period (1-7) days and the period
(14 days or more) comes at the end. There is no statistically sig
... Show More