Compressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of compression ratio (CR), mean square error (MSE) and peak signal to noise ratio (PSNR) are assessed. Computer simulation results indicate that the two dimensions MCT offer a better compression ratio, MSE and PSNR than DWT.
Image content verification is to confirm the validity of the images, i.e. . To test if the image has experienced any alteration since it was made. Computerized watermarking has turned into a promising procedure for image content verification in light of its exceptional execution and capacity of altering identification.
In this study, a new scheme for image verification reliant on two dimensional chaotic maps and Discrete Wavelet Transform (DWT) is introduced. Arnold transforms is first applied to Host image (H) for scrambling as a pretreatment stage, then the scrambled host image is partitioned into sub-blocks of size 2×2 in which a 2D DWT is utilized on ea
... Show MoreThis Study is Concerned with (the debate of democracy in the modern islamic political thought ) which discovers the attitudes and this trend of thought so-called democracy . Therefore this study is divided into three sections : the first section is concerned with the democracy in extremist Islamic speech, the second section tackles appropriation of democracy in moderate Islamic speech , while the third section is concerned with the democracy in Aistighrabi Islamic speech . Finally the conclusion sums up the findings of the study
The theories and applications of speaker identification, recognition, and verification are among the well-established fields. Many publications and advances in the relevant products are still emerging. In this paper, research-related publications of the past 25 years (from 1996 to 2020) were studied and analysed. Our main focus was on speaker identification, speaker recognition, and speaker verification. The study was carried out using the Science Direct databases. Several references, such as review articles, research articles, encyclopaedia, book chapters, conference abstracts, and others, were categorized and investigated. Summary of these kinds of literature is presented in this paper, together with statistical analyses
... Show MoreProverbs gain their importance not only from the fact that they represent a cultural record of the people of every nation, but they reveal the way they use language and how they exploit their environments as a good source of inspiration to enrich that language. Domestic animals, as part of every environment, play a major role in composing proverbs in every nation.
This study is an attempt to pragmastylistically analyse some selected English and Iraqi rural proverbs using domestic animals in their texts. It limits itself to investigate certain stylistic and pragmatic devices such as: the type of sentences, their lengths, their content and grammatical words, the part of speech used, metaph
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThis paper aims at analyzing Terry Bisson’s short story Bears Discover Fire stylistically by following both Gerard Genette’s theory of narratology (1980) and Short and Leech (1981) strategy for analyzing fictional works. Also trying to examine to what extent these models are applicable in analyzing the selected story. Stylistic analysis procedures help the readers/researchers to identify specific linguistic features in order to support literary interpretation and appreciation of literary texts. Style in fiction concentrates not on what is written, but on how a text is written. Each writer has his own style and techniques which distinguish him from other writers
Narcissism is a complicated phenomenon that can be reflected in the narcissist’s language. Investigating narcissism in terms of linguistics, and pragmatics in particular, does not seem to have been given its due attention, as this study reveals. Thus, this study is an endeavor to discover how narcissism is reflected in the American movie Big Eyes (2014). It is known for introducing narcissistic behaviors. This paper aims to identify the types, motivations, and pragmatic manifestations of narcissism in the selected movie. Three pragmatic theories are chosen to scrutinize narcissism in the data: Searle’s speech acts (1969), Grice’s maxims breaching (1975), and Culppeper’s impoliteness (1996). To cope with the nature of the
... Show MoreMost includeding techniques of digital watermark even now working through the direct inclusion in the pixel without taking into account the level of compression (attack) that can go wrong, which makes digital watermark can be discarded easily. In this research, a method was proposed to overcome this problem, which is based on DCT (after image partitioned into non overlapped blocks with size 8×8 pixel), accompanied by a quantization method. The watermark (digital image) is embedded in DCT frequency domain seeking the blocks have highest standard deviation (the checking is only on the AC coefficients) within a predetermined threshold value, then the covered image will compressed (attacked) varying degrees of compression. The suggested met
... Show MorePoly methyl methacrylate PMMA polymer has been used continually in dental application during the recent years. Yet, it is commonly known for its poor strength properties for long periods under pressure. The aim of this research was to improve the performance of PMMA denture base through the addition of different nanoparticles selected from artificial and natural sources. For comparison, Nano -particles from Al2O3 and crushed pistachio shell were utilised. (1%, 2% and 3%) were the weight fraction used in this study for both reinforcement types. In this work, a study and evaluation in of Compression Strength (C.S.) as well as Young’s Modulus (Y) was done before and after exposure for special liquids. The new prepared composites were immerse
... Show MoreIn this paper, a hybrid image compression technique is introduced that integrates discrete wavelet transform (DWT) and linear polynomial coding. In addition, the proposed technique improved the midtread quantizer scheme once by utilizing the block based and the selected factor value. The compression system performance showed the superiority in quality and compression ratio compared to traditional polynomial coding techniques.