Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio files, by converting an audio file in to a text file and then compressing the new text file by using the common compression techniques is 6-bit coding algorithm its used to convert a digitized Audio file into a text file it is show that a good compression ratio between 15-35 %.
The study scrutinises intermingled relations between children literature and some ecological issues. Such interwoven relationships would be highly recommended to encourage children to explore and identify themselves with nature from early ages to avoid facing an extreme experience later on. The research limits its scope to two novels Suzanne Collins’ (1962) The Hunger Games trilogy (2003-2007) and William Golding’s (1911-1993) Lord of the Flies (1954), and both novels have no direct connections with Ecology and the Eco-consciousness, yet it offers an insightful description about Man’s experience with Nature. Moreover, it raises serious moral questions, raises awareness, heals wounds and suggests solutions for the problems th
... Show MoreThis study shows impoliteness as a form of face-threatening that can be intentionally caused by verbal threats in a particular setting. It investigates: what strategies and mitigators do Iraqi-Kurdish English as a foreign language (EFL) learners use in situations of threat responses? The present investigation paper aims to examine impoliteness strategies and mitigators by these learners when they respond to threatening situations in their context. Thus, it fills a gap in pragmatics literature by investigating the reactions to threats in an Iraqi-Kurdish EFL context. To this end, 50 participants have participated in this study. An open-ended questionnaire in the form of a Discourse Completion Task (DCT) is used to elicit responses fr
... Show MoreThe convolutional neural networks (CNN) are among the most utilized neural networks in various applications, including deep learning. In recent years, the continuing extension of CNN into increasingly complicated domains has made its training process more difficult. Thus, researchers adopted optimized hybrid algorithms to address this problem. In this work, a novel chaotic black hole algorithm-based approach was created for the training of CNN to optimize its performance via avoidance of entrapment in the local minima. The logistic chaotic map was used to initialize the population instead of using the uniform distribution. The proposed training algorithm was developed based on a specific benchmark problem for optical character recog
... Show MoreCIGS nanoink has synthesized from molecular precursors of CuCl, InCl3, GaCl3 and Se metal heat up 240 °C for a half hour in N2-atmosphere to form CIGS nanoink, and then deposited onto substrates of soda-lime glass (SLG). This work focused on CIGS nanocrystals, indicates their synthesis and applications in photovoltaic devices (PVs) as an active light absorber layers. in this work, using spin-coating to deposit CIGS layers (75 mg/ml and 500 nm thickness), without selenization at high temperatures, were obtained up to 1.398 % power conversion efficiency (PCE) at AM 1.5 solar illumination. Structural formations of CIGS chalcopyrite structure were studied by using x ray diffraction XRD. The morphology and composition of CIGS were studied using
... Show MorePhotoacoustic is a unique imaging method that combines the absorption contrast of light or radio frequency waves with ultrasound resolution. When the deposition of this energy is sufficiently short, a thermo-elastic expansion takes place whereby acoustic waves are generated. These waves can be recorded and stored to construct an image. This work presents experimental procedure of laser photoacoustic two dimensional imaging to detect tumor embedded within normal tissue. The experimental work is accomplished using phantoms that are sandwiched from fish heart or blood sac (simulating a tumor) 1-14mm mean diameter embedded within chicken breast to simulate a real tissue. Nd: YAG laser of 1.064μm and 532nm wavelengths, 10ns pulse duration, 4
... Show MoreA sensitive and accurate colorimetric method was developed for the determination of the Sitagliptin phosphate monohydrate, here and after will be named Sitagliptin, in its pure and pharmaceutical form. The suggested approach is based on boosting the sensitivity of the traditional spectrometric methods by derivatizing Sitagliptin into a colored product that absorbs the visible spectrum at 573 nm. The proposed method has effectively improved the sensitivity and the limit of detection for the analysis of Sitagliptin. A linear calibration curve was obtained over the concentration range of 0.1-10 μg/ml with a correlation coefficient of 0.9983. The calculated recovery was within the range of 98.98–100.11%. While the limit of detection LOD and
... Show MoreBackground: Coated aesthetic archwires are currently the existing solutions for the esthetic problem, but the color of these archwires tends to change overtime. This study was aimed to evaluate the color stability of different types of esthetic archwires from four different companies at different time periods after immersion of two different staining drinks which are tea and Pepsi cola. Materials and methods: 48 specimens were prepared, each specimen contains 10 aesthetic archwires; and were divided according to type of solution into two groups: A (tea) &B (Pepsi cola); each group contained 24 specimens (12 specimens were immersed in the staining solution as 4 specimens for each time intervals and 12 specimens were immersed in distilled wa
... Show MoreThis report explores emerging techniques to boost multimedia transfer effectiveness, given the escalating need for improved quality and performance in multimedia interactions. The analysis involves a thorough literature assessment and comparison of present strategies to pinpoint key tendencies and propose novel approaches. The methodology involves examining recent technological enhance ments in video coding standards, quality appraisal methods, and compression tech niques. Specific domains investigated comprise firmware component architectures, 4D indexing structures, and iterative filtering frameworks. The study in addition weighs tradeoffs between video quality, encoding intricacy, and bitrate demands. Key determinations consist of
... Show MoreBackground: The aim of this study was to measure the radiopacity (RO) of modified microhybrid composite resins by adding 2 types of nanofillers (Zinc Oxide and Calcium Carbonate) in two concentrations 3% and 5% and comparing them to unmodified microhybrid composite resins and to nanofilled composite resin. Materials and Methods: Two types of composite resin were used (Microhybrid composite MH Quadrent anterior shine and Nanofilled composite resin Filtek Z350 XT), for each tested group five disk-shaped specimens (1-mm-thick and 15 mm diameter) were fabricated. The material samples were radiographed together with the aluminum step wedge. The density of the specimens was determined with a transmission densitometer and was expressed in term of
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt