MR Younus, Nasaq Journal, 2022
Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreIt is not available for us to go back in time and see plays old and it plays giants tragedy ancient Greek (Aeschylus, Sofokls, and yourbedes) through the eyes of a generation ago, and if we were able to go back to Ntegathm play it is certain that we will not taste or Nstassig for much of what we see from these offers will not afford the traditional religious rituals, which was accompanied also dance and music in the style of ancient Greek play was representing a large part of the theater see manifestations Can our eyes and ears we twentieth century audience to accept those appearances, and it was then?
Inevitably it will look like a museum bycollection not only. So we find ourselves in the light of the foregoing forced When you do rem
The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreThin films of (Cu2S)100-x( SnS2 )x at X=[ 30,40, &50)]% with thickness (0.9±0.03)µm , had been prepared by chemical spray pyrolysis method on glass substrates at 573 K. These films were then annealed under low pressure of(10-2) mbar ,373)423&473)K for one hour . This research includes , studying the the optical properties of (Cu2S)100-x-(SnS2)x at X=[ 30,40, &50)]% .Moreover studying the effect of annealing on their optical properties , in order to fabricate films with high stability and transmittance that can be used in solar cells. The transmittance and absorbance spectra had been recorded in the wavelength range (310 - 1100) nm in order to study the optical properties . It was found that these films had direct optical band
... Show MoreBackground: White spot lesions (WSLs) are subsurface enamel demineralization manifested as white opacities which had an esthetic problem. The purpose of this in-vitro study was to evaluate the lesion depth improvement of WSLs following application of fluoride varnish, tooth mousse and resin infiltration (ICON). Materials and methods: Artificial WSLs were created on 120 premolar teeth using demineralization solution with pH (4-4.5). Samples randomly allocated into four groups; fluoride varnish, tooth mousse, ICON and untreated group. Groups were discolored in Cola and orange juice for 24 hours. Teeth were ground sectioned by longitudinal cutting then these sections examined and photographed under stereomicroscope at 12X magnification then an
... Show MoreBackground:The demand for esthetic orthodontic appliances is increasing so that the esthetic orthodontic archwires were introduced. This in vitro study was designed to evaluate the surface roughness offiber-reinforced polymer composite (FRPC) archwires compared to coated nickel-titanium (NiTi) archwires immersed in artificial saliva. Materials and Methods:Three types of esthetic orthodontic archwires were used: FRPC (Dentaurum), Teflon coated NiTi (Dentaurum) and epoxy coated NiTi (Orthotechnology). They were round (0.018 inch) in cross section and cut into pieces of 15 mm in length.Forty pieces from each type were divided into four groups; one group was left at a dry condition and the other three groups were immersed in artificial saliva (
... Show More