Preferred Language
Articles
/
ijs-3212
Effects of Using Static Methods with Contourlet Transformation on Speech Compression

Compression of speech signal is an essential field in signal processing. Speech compression is very important in today’s world, due to the limited bandwidth transmission and storage capacity. This paper explores a Contourlet transformation based methodology for the compression of the speech signal. In this methodology, the speech signal is analysed using Contourlet transformation coefficients with statistic methods as threshold values, such as Interquartile Filter (IQR), Average Absolute Deviation (AAD), Median Absolute Deviation (MAD) and standard deviation (STD), followed by the application of (Run length encoding) They are exploited for recording speech in different times (5, 30, and 120 seconds). A comparative study of performance of different transforms is made in terms of (Signal to Noise Ratio,Peak Signal to Noise Ratio,Normalized Cross-Correlation, Normalized Cross-Correlation) and the compression ratio (CR). The best stable result of implementing our algorithm for compressing speech is at level1 with   AAD or MAD, adopting Matlab 2013a language.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Ieee Access
Scopus (37)
Crossref (35)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Wallet Key Generation for a Generic Blockchain based on Speech

      As a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of The College Of Languages (jcl)
A Critical Discourse Analysis of Hate Speech

Online communication on social networks has become a never-given-up way of expressing and sharing views and opinions within the realm of all topics on earth, and that is that! A basis essential in this is the limits at which "freedom of expression" should not be trespassed so as not to fall into the expression of "hate speech". These two ends make a base in the UN regulations pertaining to human rights: One is free to express, but not to hate by expression. Hereunder, a Critical Discourse Analysis in terms of Fairclough's dialectical-relational approach (2001) is made of Facebook posts (being made by common people, and not of official nature)  targeting Islam and Muslims. This is made so as to recognize these instances of "speech" a

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
Advances In Structural Engineering
CFRP Strengthening of RC Beams with Multiple Openings Subjected to Static and Impact Loads

The provision of openings in serviceable reinforced concrete beams may result in a substantial decline in the beam's capacity and integrity, indicating the necessity of opening strengthening. The present study investigates the experimental response of reinforced concrete T-beams with multiple web-strengthened openings disposed in shear span to static and impact loads. Fourteen RC T-beams were tested in two groups, each of seven beams. The first group was tested under static loading up to failure, while the second group was tested under repeated impact loading until the width of shear cracks reached 0.3 mm. The residual static strengths of the beams subjected to impact loading were then determined. The test variables considered were

... Show More
Crossref (10)
Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Advances In Structural Engineering
CFRP Strengthening of RC Beams with Multiple Openings Subjected to Static and Impact Loads

The provision of openings in serviceable reinforced concrete beams may result in a substantial decline in the beam's capacity and integrity, indicating the necessity of opening strengthening. The present study investigates the experimental response of reinforced concrete T-beams with multiple web-strengthened openings disposed in shear span to static and impact loads. Fourteen RC T-beams were tested in two groups, each of seven beams. The first group was tested under static loading up to failure, while the second group was tested under repeated impact loading until the width of shear cracks reached 0.3 mm. The residual static strengths of the beams subjected to impact loading were then determined. The test variables considered were

... Show More
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Engineering
Variation of Compression Index and Swelling Index with Degree of Saturation in Unsaturated Soils

The variation of compression index Cc and swelling index Cs with the degree of saturation S was studied on unsaturated and fully saturated soils for different degrees of saturation (100%, 91%, 85%, 75%, 60%), several mathematical equations were found to describe these relationships, these equations can be used to predict settlement during the consolidation process in unsaturated and fully saturated soils.

 

View Publication Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Text Hiding in Color Images Using the Secret Key Transformation Function in GF (2n)

Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.

View Publication Preview PDF
Publication Date
Fri Apr 15 2016
Journal Name
International Journal Of Computer Applications
Hybrid Techniques based Speech Recognition

Information processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (

... Show More
Crossref
View Publication
Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Economics And Administrative Sciences
Using Some Estimation Methods for Mixed-Random Panel Data Regression Models with Serially Correlated Errors with Application

This research includes the study of dual data models with mixed random parameters, which contain two types of parameters, the first is random and the other is fixed. For the random parameter, it is obtained as a result of differences in the marginal tendencies of the cross sections, and for the fixed parameter, it is obtained as a result of differences in fixed limits, and random errors for each section. Accidental bearing the characteristic of heterogeneity of variance in addition to the presence of serial correlation of the first degree, and the main objective in this research is the use of efficient methods commensurate with the paired data in the case of small samples, and to achieve this goal, the feasible general least squa

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
Crossref
View Publication