Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio files, by converting an audio file in to a text file and then compressing the new text file by using the common compression techniques is 6-bit coding algorithm its used to convert a digitized Audio file into a text file it is show that a good compression ratio between 15-35 %.
Zerumbone (ZER), a natural compound has been extracted from Zingiber zerumbet with known pharmacological activities. The aim was to determine the anti-human Burkitt’s lymphoma (Raji) cell effect of ZER. The 3-(4,5-dimethylthiazol-2-yl)-2,5,-diphenyltetrazolium bromide (MTT) assay was used to determine cytotoxic effect while the Annexin-V-fluorescein isothiocyanate/propidium iodide-PI flow cytometric assays was used to determine apoptotic effect of ZER on the human Burkitt’s lymphoma (Raji) cell (ATCC CCL-86) cell line. The expressions of Bax, Bcl-2, and c-Myc genes were determined via real-time PCR. ZER suppressed the proliferation of Raji cells with a 48 h IC50 value of 5.1 μg/mL. Treated Raji cells also underwen
... Show MoreBased on Lyapunov exponent criterion, the aircraft lateral-directional stability during critical flight cases is presented. A periodic motion or limit cycle oscillation isdisplayed. A candidate mechanism for the wing rock limit cycle is the inertia coupling between an unstable lateral-directional (Dutch roll) mode with stable longitudinal (short period) mode. The coupling mechanism is provided by the nonlinear interaction of motion related terms in the complete set equations of motion. To analyze the state variables of the system, the complete set of nonlinear equations of motion at different high angles of attack are solved. A novel analysis including the variation of roll angle as a function of angle of attack is proposed. Furthermore
... Show MoreThis study was aimed to investigat integrated system for in vitro growth of paulownia plants by assessing the efficacy of chlorine dioxide (ClO2) as an alternative to autoclave in sterilizing culture medium. Therefore, this study was devised to compare autoclave sterilization at three different times (5, 10, and 15) minutes and three different concentrations of ClO2 (0, 0.4, 0,8, 1) mg/L. The results showed that, compared with (0.4) mg/L concentration, concentrations of (0.8 and 1) mg/L are more effective at sterilizing the culture medium. ClO2 sterilization improved individual single node growth more than autoclave sterilization. Since ClO2 is non-toxic, it could be used as a safe alternative to autoclave when propagating paulown
... Show MoreThe aim of this research is to construct an educational program in light of the theory of behavioral cognitive and its impact on the development of the efficient response to students affected by crises (centers of your right to education). To achieve the objectives of the research, two scales were developed by the researcher in addition to two equivalent hypotheses were formulated. The scale contains (26) items divided into five fields; for its validity and reliability were derived based on the measure of efficient response, an educational program based on the theory of behavioral cognition. The test and the educational program were applied to a sample of (60) students from the centers of your right to education, divided into experimenta
... Show MoreThe current research aims to train students to take benefit of their studies to analyze and taste the artistic works as one of the most important components of the academic structure for students specializing in visual arts; then to activate this during training them the methods of teaching. Consequently, the capabilities of mind maps were employed as a tool that would be through freeing each student to analyze a model of artistic work and think about his analytical principles according to what he knows. Then, a start-up with a new stage revolves around the possibility of transforming this analysis into a teaching style by thinking about how the student would do. The same person who undertook the technical analysis should offer this work
... Show MoreResin-modified glass ionomer cement tends to shrink due to polymerization of the resin component. Additionally, they are more prone to syneresis and imbibition during the setting process. This
This research is drawn from a doctoral dissertation, studying the approach of Sheikh Abd al-Qadir al-Muhajir al-Sanandji al-Kurdi (1303 AH) on the issue of proving the existence of God Almighty.
Sheikh Abd al-Qadir al-Sanandji was one of the scholars well versed in mental sciences. He has many books, all of them in the sciences of speech and wisdom, and among his books is the book (Raising the Eyebrow in Explanation of Ithbat al-Wajib), which is still a manuscript that has not been printed.
Through this book, the researcher studied the evidence of Sheikh Abdul Qadir to prove the existence of God Almighty, and compared it with the evidence of philosophers and theologians.
At the beginning, he presented a study on the import
A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance