Compression of speech signal is an essential field in signal processing. Speech compression is very important in today’s world, due to the limited bandwidth transmission and storage capacity. This paper explores a Contourlet transformation based methodology for the compression of the speech signal. In this methodology, the speech signal is analysed using Contourlet transformation coefficients with statistic methods as threshold values, such as Interquartile Filter (IQR), Average Absolute Deviation (AAD), Median Absolute Deviation (MAD) and standard deviation (STD), followed by the application of (Run length encoding) They are exploited for recording speech in different times (5, 30, and 120 seconds). A comparative study of performance
... Show MoreWalkability as one of the Planning Treatments to Face Epidemics in Cities
Crude oil still affects many countries because it is one of the essential fuel sources. It makes life more manageable in modern communities and cannot be overstated because it is easy to use and find. However, the pollution caused by its use in industries such as mining, transportation, and the oil and gas business, especially soil pollution, cannot be ignored. Soil pollution is an issue in most communities because it influences people and ecology. Accidental infusions and spills of ore oils are prevalent occurrences leading to the entire or fractional exchange of the soil pore fluid by oil-contaminated soils that have affected the geotechnical engineering properties. The liquid limitations for polluted soil grades silty loam and sa
... Show MoreCrude oil still affects many countries because it is one of the essential fuel sources. It makes life more manageable in modern communities and cannot be overstated because it is easy to use and find. However, the pollution caused by its use in industries such as mining, transportation, and the oil and gas business, especially soil pollution, cannot be ignored. Soil pollution is an issue in most communities because it influences people and ecology. Accidental infusions and spills of ore oils are prevalent occurrences leading to the entire or fractional exchange of the soil pore fluid by oil-contaminated soils that have affected the geotechnical engineering properties. The liquid limitations for polluted soil grades silty loam and sa
... Show MoreI noticed a researcher while working in the kindergarten that there is a group of
parameters resort to the use of different methods may be some undesirable and some
undesirable So felt researcher detection methods used parameters Riyadh in the face of the
pressures of life, being engaged in kindergarten eligibility, governmental or being married or
unmarried, as well as educational attainment for this parameter.
To achieve the objectives of the research: -
The researcher prepare a scale methods face the pressures of life of the parameters
have been confirmed the veracity of the paragraphs of the scale of the presentation to a group
of experts in this area, and extracted power discriminatory clauses scale and extra
Milling process is a common machining operation that is used in the manufacturing of complex surfaces. Machining-induced residual stresses (RS) have a great impact on the performance of machined components and the surface quality in face milling operations with parameter cutting. The properties of engineering material as well as structural components, specifically fatigue life, deformation, impact resistance, corrosion resistance, and brittle fracture, can all be significantly influenced by residual stresses. Accordingly, controlling the distribution of residual stresses is indeed important to protect the piece and avoid failure. Most of the previous works inspected the material properties, tool parameters, or cutting parameters, bu
... Show MoreThe Neutron Fermi Age, t, and the neutron slowing down density, q (r, t) , have been measured for some materials such as Graphite and Iron by using gamma spectrometry system UCS-30 with NaI (Tl) detector. This technique was applied for Graphite and Iron materials by using Indium foils covered by Cadmium and the measurements done at the Indium resonance of 1.46 eV. These materials are exposed to a plane 241Am/Be neutron source with recent activity 38 mCi. The measurements of the Fermi Age were found to be t = 297 ± 21 cm2 for Graphite, t = 400 ± 28 cm2 for Iron. Neutron slowing down density was also calculated depending on the recent experimental t value and distance.
PC-based controller is an approach to control systems with Real-Time parameters by controlling selected manipulating variable to accomplish the objectives. Shell and tube heat exchanger have been identified as process models that are inherently nonlinear and hard to control due to unavailability of the exact models’ descriptions. PC and analogue input output card will be used as the controller that controls the heat exchanger hot stream to the desired temperature.
The control methodology by using four speed pump as manipulating variable to control the temperature of the hot stream to cool to the desired temperature.
In this work, the dynamics of cross flow shell and tube heat exchanger is modeled from step changes in cold water f
Agent technology has a widespread usage in most of computerized systems. In this paper agent technology has been applied to monitor wear test for an aluminium silicon alloy which is used in automotive parts and gears of light loads. In addition to wear test monitoring، porosity effect on
wear resistance has been investigated. To get a controlled amount of porosity, the specimens have
been made by powder metallurgy process with various pressures (100, 200 and 600) MPa. The aim of
this investigation is a proactive step to avoid the failure occurrence by the porosity.
A dry wear tests have been achieved by subjecting three reciprocated loads (1000, 1500 and 2000)g
for three periods (10, 45 and 90)min. The weight difference a
In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox
... Show More