Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio files, by converting an audio file in to a text file and then compressing the new text file by using the common compression techniques is 6-bit coding algorithm its used to convert a digitized Audio file into a text file it is show that a good compression ratio between 15-35 %.
The first aim of this paper was to evaluate the push-out bond strength of the gutta-percha coating of Thermafil and GuttaCore and compare it with that of gutta-percha used to coat an experimental hydroxyapatite/polyethylene (HA/PE) obturator. The second aim was to assess the thickness of gutta-percha around the carriers of GuttaCore and HA/PE obturators using microcomputed tomography (
With the increasing integration of computers and smartphones into our daily lives, in addition to the numerous benefits it offers over traditional paper-based methods of conducting affairs, it has become necessary to incorporate one of the most essential facilities into this integration; namely: colleges. The traditional approach for conducting affairs in colleges is mostly paper-based, which only increases time and workload and is relatively decentralized. This project provides educational and management services for the university environment, targeting the staff, the student body, and the lecturers, on two of the most used platforms: smartphones and reliable web applications by clo
The makers of strife exist in every era and time. They differ in how these temptations are created and the methods used in doing so. In our modern era, they are more; This is due to the presence of information technology and its easy availability at their fingertips, as well as the spread of social networking sites, which are rapidly spreading among ignorant groups and groups that are deficient in their use. Which led the makers of sedition to exploit these matters and create various temptations and spread them among peoples and societies. Today, we cannot predict the future of humanity in light of this huge amount of temptation. What the Holy Qur’an mentioned about the types of temptations in its noble verses and their embodiment in seve
... Show MoreIntroduction. Epilepsy is a progressive, chronic neurological disorder characterized by recurrent seizures. Peppermint (Mentha piperita L.) (MP) is one of the most commonly ingested herbal teas or tisanes with a single component. Aim. We aimed to assess the potential antiepileptic and neuroprotective features of MP essential oil (MPO) in pilocarpine (P) and pentylenetetrazol (PTZ) models of epilepsy. Methods. The study used eight groups of mice to assess the anticonvulsant activity of MPO in both the P and PTZ acute models in mice. P (350 mg/kg, i.p.) was given 30 minutes after MPO (1.6, 3.2, and 6.4 ml/kg, i.p.). As a positive control group, diazepam (1 mg/kg, i.p) was used. PTZ (95 mg/kg, i.p.) was given 30 minutes after M
... Show MoreThe almighty Al-Bari imposed on Muslims easy and accessible worshipers for every individual who is eligible to commission, so whoever performed it rightfully, God rewarded it with the best reward. From the Muslim, the Almighty made the Almighty to the types of acts of worship and acts of righteousness as a reason for the remission of sins that were advanced and late, so I chose a topic (from the hadiths of righteous deeds mentioned in the atonement of sins) as a research drawn from the master’s thesis called (the hadiths of the atoners of sins that were presented and delayed - An analytical study- ), And collect in this research kinds of acts of righteousness that bring the mercy of God Almighty to His servants and be a reason for the
... Show MoreObjectives: To identify the effectiveness program on nurse- midwife practice concerning performed
cardiotocography to pregnant women and to find out the relationship between nurse- midwife practice and
certain studied variables.
Methodology: A quasi-experimental design (pretest-post test approach) was conducted at three sector AlRussafa
directorate, AL- Karckh directorate and Medical City Directorate from the period of March, 26th 2014
to August, 30th 2015. A non-probability sample consisted of (130) nurse -midwives were selected and divided
into two groups (65) nurses-midwives (case group) who exposed to the educational program and (65 ) nursesmidwives
who didn't expose to the program considered as control group . D
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More