Information processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (Ecl) distance match performance is (62%) in MWM. So, in speech recognition to get the high alignment and high performance one must use DTW distance measurement.
Hybrid bilayer heterojunction Zinc Phthalocyanine (ZnPc) thin-film P-type is considered as a donor active layer as well as the Zinc Oxide (ZnO) thin film n-type is considered as an acceptor with (Electron Transport Layer). In this study, using the technique of Q-switching Nd-YAG Pulsed Laser Deposition (PLD) under vacuum condition 10-3 torr on two ITO (Indium Tin Oxide) and (AL) electrodes and aluminum, is used to construct the hydride bilayer photovoltaic solar cell heterojunction (PVSC). The electrical properties of hybrid heterojunction Al/ZnPc/ZnO/ITO thin film are studied. The results show that the voltage of open circuit (V_oc=0.567V), a short circuit (I_sc=36 ?A), and the fill factor (FF) of 0.443. In addition, the conversion
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreRealistic implementation of nanofluids in subsurface projects including carbon geosequestration and enhanced oil recovery requires full understanding of nanoparticles (NPs) adsorption behaviour in the porous media. The physicochemical interactions between NPs and between the NP and the porous media grain surface control the adsorption behavior of NPs. This study investigates the reversible and irreversible adsorption of silica NPs onto oil-wet and water-wet carbonate surfaces at reservoir conditions. Each carbonate sample was treated with different concentrations of silica nanofluid to investigate NP adsorption in terms of nanoparticles initial size and hydrophobicity at different temperatures, and pressures. Aggregation behaviour and the
... Show MoreThis study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreStealth marketing is considered as one of the contemporary issues that researchers have begun to explore as a current understanding. It is the marketing approach used by organizations to promote their products and services to the public in implicit and indirect manner. In this article, the concept of stealth marketing will be discussed throw its advantages and disadvantages. In addition, the different techniques of stealth marketing have been discussed including: viral marketing, celebrity marketing, brand pushers, bait-and-tease marketing, video games marketing, and marketing in music. Furthermore, a new technique of marketing entitled “Marketing through social responsibility” has been added and discussed according to the themes in the
... Show MoreThe prepared nanostructure SiO2 thin films were densified by two techniques (conventional and Diode Pumped Solid State Laser (DPSS) (532 nm). X-ray diffraction (XRD), Field Emission Scanning electron microscopy (FESEM), and Atomic Force Microscope (AFM) technique were used to analyze the samples. XRD results showed that the structure of SiO2 thin films was amorphous for both Oven and Laser densification. FESEM and AFM images revealed that the shape of nano silica is spherical and the particle size is in nano range. The small particle size of SiO2 thin film densified by DPSS Laser was (26 nm) , while the smallest particle size of SiO2 thin film densified by Oven was (111 nm).