Compressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of compression ratio (CR), mean square error (MSE) and peak signal to noise ratio (PSNR) are assessed. Computer simulation results indicate that the two dimensions MCT offer a better compression ratio, MSE and PSNR than DWT.
The idea of using slender Reinforced Concrete (RC) columns with cross-shaped (+-shaped) instead of columns with square-shaped was discussed in this paper. The use of +-shaped columns provides many architectural and structural advantages, such as avoiding prominent columns edges and improved the structural response of member. Therefore, this study explores the structural response of slender +-shaped columns experimentally and numerically by nonlinear finite element analysis using Abaqus simulation tools. The results showed an excellent convergence in strength between numerical and test results with an average standard deviation of 0.05 and 0.07. Besides that, the use of +-shaped column
The ability of the human brain to communicate with its environment has become a reality through the use of a Brain-Computer Interface (BCI)-based mechanism. Electroencephalography (EEG) has gained popularity as a non-invasive way of brain connection. Traditionally, the devices were used in clinical settings to detect various brain diseases. However, as technology advances, companies such as Emotiv and NeuroSky are developing low-cost, easily portable EEG-based consumer-grade devices that can be used in various application domains such as gaming, education. This article discusses the parts in which the EEG has been applied and how it has proven beneficial for those with severe motor disorders, rehabilitation, and as a form of communi
... Show MoreThe aim of this research is controlling the amount of the robotic hand catching force using the artificial muscle wire as an actuator to achieve the desired response of the robotic hand in order to catch different things without destroying or dropping them; where the process is to be similar to that of human hand catching way. The proper selection of the amount of the catching force is achieved through out simulation using the fuzzy control technique. The mechanism of the arrangement of the muscle wires is proposed to achieve good force selections. The results indicate the feasibility of using this proposed technique which mimics human reasoning where as the weight of the caught peace increases, the force increases also with approximatel
... Show MoreLaser drilling is capable of producing small, precisely positioned holes with high degree of reproductively. In this paper , IR millisecond Nd:YAG single pulsed laser was used to determine the effect of laser parameters on the drilled hole of the glass - fiber reinforced epoxy composite FR-4 sample of 2 mm in thickness . The type of laser source was GSI lumonics JK760TR Series laser 1.064μm system in a CNC cabin. The JK760TR series has a 0.3-50ms pulse length and a maximum repetition rate 500Hz with an average power of 600W. The investigation of single pulse laser drilling in this paper was based on theoretical and experimental solutions. In single pulse technique, the investigation included focal plane position fpp, pulse shap
... Show MoreMany objective optimizations (MaOO) algorithms that intends to solve problems with many objectives (MaOP) (i.e., the problem with more than three objectives) are widely used in various areas such as industrial manufacturing, transportation, sustainability, and even in the medical sector. Various approaches of MaOO algorithms are available and employed to handle different MaOP cases. In contrast, the performance of the MaOO algorithms assesses based on the balance between the convergence and diversity of the non-dominated solutions measured using different evaluation criteria of the quality performance indicators. Although many evaluation criteria are available, yet most of the evaluation and benchmarking of the MaOO with state-of-art a
... Show More
XML is being incorporated into the foundation of E-business data applications. This paper addresses the problem of the freeform information that stored in any organization and how XML with using this new approach will make the operation of the search very efficient and time consuming. This paper introduces new solution and methodology that has been developed to capture and manage such unstructured freeform information (multi information) depending on the use of XML schema technologies, neural network idea and object oriented relational database, in order to provide a practical solution for efficiently management multi freeform information system.
The statistical distributions study aimed to obtain on best descriptions of variable sets phenomena, which each of them got one behavior of that distributions . The estimation operations study for that distributions considered of important things which could n't canceled in variable behavior study, as result this research came as trial for reaching to best method for information distribution estimation which is generalized linear failure rate distribution, throughout studying the theoretical sides by depending on statistical posteriori methods like greatest ability, minimum squares method and Mixing method (suggested method).
The research
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreWind energy is one of the most common and natural resources that play a huge role in energy sector, and due to the increasing demand to improve the efficiency of wind turbines and the development of the energy field, improvements have been made to design a suitable wind turbine and obtain the most energy efficiency possible from wind. In this paper, a horizontal wind turbine blade operating under low wind speed was designed using the (BEM) theory, where the design of the turbine rotor blade is a difficult task due to the calculations involved in the design process. To understand the behavior of the turbine blade, the QBlade program was used to design and simulate the turbine rotor blade during working conditions. The design variables suc
... Show MoreRenewable energy technology is growing fast especially photovoltaic (PV) system to move the conventional electricity generation and distribution towards smart grid. However, similar to monthly electricity bill, the PV energy producers can only monitor their energy PV generation once a month. Any malfuntion in PV system components may reduce the performance of the system without notice. Thus, developing a real-time monitoring system of PV production is very crucial for early detection. In addition, electricity consumption is also important to be monitored more frequently to increase energy savings awareness among consumers. Hardware based Internet-of-Thing (IoT) monitoring and control system is widely used. However, the implementation of
... Show More