A new algorithm is proposed to compress speech signals using wavelet transform and linear predictive coding. Signal compression based on the concept of selecting a small number of approximation coefficients after they are compressed by the wavelet decomposition (Haar and db4) at a suitable chosen level and ignored details coefficients, and then approximation coefficients are windowed by a rectangular window and fed to the linear predictor. Levinson Durbin algorithm is used to compute LP coefficients, reflection coefficients and predictor error. The compress files contain LP coefficients and previous sample. These files are very small in size compared to the size of the original signals. Compression ratio is calculated from the size of the compressed signal relative to the size of the uncompressed signal. The proposed algorithms where fulfilled with the use of Matlab package
Background: Apexification is a method to induce a calcified barrier in a root with an open apex or the continued apical development of an incomplete root in teeth with necrotic pulp. MTA apexification has several advantages such as it neither gets resorbed, nor weakens the root canal dentin, and also sets in the wet environment. The aim of this study is to evaluate the effectiveness of the use of MTA in apexification and periapical healing of teeth with incomplete root formation and periapical infection. Materials and method: Apexification was carried out on fourteen permanent immature teeth of eleven children aged 7-12 years attended the teaching hospital of College of Dentistry, Baghdad University using mineral trioxide aggregate followed
... Show MoreIn this paper waste natural material (date seed) and polymer particles(UF) were used for investigation of removal dye of the potassium permanganate. Also study effect some variables such as pH, dye concentration and adsorbent concentration on dye removal. 15 experimental runs were done using the itemized conditions designed established on the Box-Wilson design employed to optimize dye removal. The optimum conditions for the dye removal were found: (pH) 12, (dye con.) 2.38 ppm, (adsorbant con.) 0.0816 gm for date seed with 95.22% removal and for UF (pH) 12, (dye con.) 18 ppm, (adsorbant con.) 0.2235 gm with 91.43%. The value of R-square was 85.47% for Date seed and (88.77%) for UF.
... Show More
This article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreThe green production of iron oxide nanoparticles (FeONPs) due to its numerous biotechnological uses has attracted a lot of attention and clean and eco-friendly approaches in the medical field.
The objectives of this study are to demonstrate the biogenic creation of FeONPs. The search for alternative antimicrobial medicines has been prompted by growing worries about multidrug resistance.
A liquid-solid chromatography of Bovine Serum Albumin (BSA) on (diethylaminoethyl-cellulose) DEAE-cellulose adsorbent is worked experimentally, to study the effect of changing the influent concentration of (0.125, 0.25, 0.5, and 1 mg/ml) at constant volumetric flow rate Q=1ml/min. And the effect of changing the volumetric flow rate (1, 3, 5, and 10 ml/min) at constant influent concentration of Co=0.125mg/ml. By using a glass column of (1.5cm) I.D and (50cm) length, packed with adsorbent of DEAE-cellulose of height (7cm). The influent is introduced in to the column using peristaltic pump and the effluent concentration is investigated using UV-spectrophotometer at 30oC and 280nm wavelength. A spread (steeper) break-through curve is gained
... Show MoreThe present study examines the extraction of lead (Pb), cadmium (Cd) and nickel (Ni) from a contaminated soil by washing process. Ethylenediaminetetraacetic acid disodium salt (Na2EDTA) and hydrochloric acid (HCl) solution were used as extractants. Soil washing is one of the most suitable in-situ/ ex-situ remediation method in removing heavy metals. Soil was artificially contaminated with 500 mg/kg (Pb , Cd and Ni ). A set of batch experiments were carried out at different conditions of extractant concentration , contact time, pH and agitation speed. The results showed that the maximum removal efficiencies of (Cd, Pb and Ni ) were (97, 88 and 24 )&nbs
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More