This paper presents a parametric audio compression scheme intended for scalable audio coding applications, and is particularly well suited for operation at low rates, in the vicinity of 5 to 32 Kbps. The model consists of two complementary components: Sines plus Noise (SN). The principal component of the system is an. overlap-add analysis-by-synthesis sinusoidal model based on conjugate matching pursuits. Perceptual information about human hearing is explicitly included into the model by psychoacoustically weighting the pursuit metric. Once analyzed, SN parameters are efficiently quantized and coded. Our informal listening tests demonstrated that our coder gave competitive performance to the-state-of-the- art HelixTM Producer Plus 9 from Real Networks®, and on the average our coder Offered a 20 percent lower bitrate for the some audio quality. The audio coder gives a much wider range of scalability than previous work of sinusoidal coders as well as existing commercial audio coders. Moreover, the audio coder a gracefully degrades in quality from hi-fidelity to a reasonable quality at a very low bitrate, 5 Kbps. The most obvious application for the SN coder is in scalable, high fidelity audio coding and signal modification.
In this study, phytoplankton density, chlorophyll-a, and selected physico- chemical parameters were investigated in Erbil wastewater channel. The surveys were carried out monthly from May 2003 to April 2004. Samplings were established on three sites from headwaters to the mouth. The results showed that pH was in alkaline side of neutrality, with significant differences (P<0.05) between sites 1 and 3. TSS concentration decreased from site 1 toward site 2 (mean value, 80.15 to 25.79 mg.l-1). A clear gradual increase in mineral content (TDS) observed from site one of the channel towards the mouthpart. Soluble reactive phosphate has a concentration maximum mean value reached 48.4 µg.l-1 which is recorded in site 2. A high positive relat
... Show MoreThis experiment was performed to investigate the influence of different oils in the diets of laying quail on their egg quality characteristics. One hundred and twenty 7-wk old Japanese quails (Coturnix coturnix japonica) were allocated to four groups with three replicates containing 10 quail each (30 quail per each treatment group). They were fed for 13 weeks (including one week of adaptation period) on diets containing 3% oil from different sources, viz. either sunflower (T1), linseed (T2), maize (T3), or fish oil (T4). Inclusion the diet of laying quail with fish oil (T4) and maize oil (T2) resulted in significant increase with respect to egg weight, yolk weight, albumen weight, yolk diameter, yolk height, albumen diameter, albumen height
... Show MoreThis experiment was performed to investigate the influence of different oils in the diets of laying quail on their egg quality characteristics. One hundred and twenty 7-week-old Japanese quails (Coturnix coturnix japonica) were allocated to four groups with three replicates containing 10 quail each (30 quail per treatment group). They were fed for 13 weeks (including one week of adaptation period) on diets containing 3% oil from different sources, viz., sunflower (T1), linseed (T2), maize (T3), or fish oil (T4). Inclusion of the diet of laying quail with fish oil (T4) and maize oil (T2) resulted in a significant increase with respect to egg weight, yolk weight, albumen weight, yolk diameter, yolk height, albumen diameter, albumen height, sh
... Show MoreThis experiment was performed to investigate the effect of dietary supplementation with flax seed on the egg quality of laying quail. A total of 320 Japanese quail (Coturnix coturnix japonica) wk old were allocated to 4 treatment groups with 4 replicates containing 20 quail each. Birds were fed a commercial diet containing 0% (C), 2% (T1), 4% (T2), or 6% (T3) flax seed. Birds received water and diet ad libitum during the total period of the experiment. Egg quality characteristics were monitored over 3 consecutive 21-day periods. Egg quality criteria involved in this experiment involved egg weight, yolk diameter, yolk height, yolk weight, albumen height, albumen weight, shell weight, shell thickness, Haugh unit, albumen percentage, yolk perc
... Show MoreThe main objective of the audit is The asset is maintained and operated efficiently and is done through to detect fraud and errors in the financial statements and to verify the accuracy and accuracy of the information contained therein and to give a neutral technical opinion on the basis of that, thus the auditor has a professional responsibility in achieving this goal, and that the effects of issuing a wrong opinion works on The loading of the beneficiaries is significant damage, And therefore the presence of any error or bias of the auditor when taking personal judgments in relation to the determination of the relative importance and the selection of audit samples and determine the adequacy and validity of evidence and implemen
... Show MoreThe centers of cities and historical quarter are exposed to a severe threat to the values of the physical and legal urban environment as a result of the value deterioration and the emergence, emergence and spread of new values on the intellectual and urban context, which generates the loss of the urban environment for its spatio-temporal continuity, flexibility, adaptation and continuity, and thus urban obsolescence, Hence the problem of the research in “the lack of comprehensiveness of studies on the phenomenon of urban obsolescence and its impact on the decline in the values of the quality of the built environment in historic
... Show More The study (Quality in the Industrial Products Designs and its Reflection on Achieving Competitive Advantage) focused on developing the products in a way that satisfies human desires through the impact of technology on products design systems and performance enhancement. The study question is: how to effectively achieve quality in industrial products designs that influences competitiveness? The aim of the research is to show the design contexts for the product and its reflection on competitiveness. The study is limited to (LG) products in 2017-2018. The results and conclusions reached at by the researcher are included in the study.
The sample models adopted contexts, forms and relational relations transcending traditional contex
In recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of ho
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More