Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio files, by converting an audio file in to a text file and then compressing the new text file by using the common compression techniques is 6-bit coding algorithm its used to convert a digitized Audio file into a text file it is show that a good compression ratio between 15-35 %.
Nowadays, most of the on-chip plasmonic single-photon sources emit an unpolarized stream of single photons that demand a subsequent polarizer stage in a practical quantum cryptography system. In this paper, we numerically demonstrated the coupling of the light emitted from a quantum emitter (QE) at 700 nm wavelength to the propagation mode supported by an on-chip hybrid plasmonic waveguide (HPW) polarization rotator. Our results proved that the light emitted is linearly polarized at 0º, 45º/−45º, and 90º with propagation lengths of 5 μm, 3.3 μm, and 3.9 μm, respectively. Moreover, high power-conversion efficiency was obtained from an applied transverse magnetic (TM) mode (0º-polarization) to a transverse electric (TE) (90º-polari
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis paper presents a study of the application of gas lift (GL) to improve oil production in a Middle East field. The field has been experiencing a rapid decline in production due to a drop in reservoir pressure. GL is a widely used artificial lift technique that can be used to increase oil production by reducing the hydrostatic pressure in the wellbore. The study used a full field model to simulate the effects of GL on production. The model was run under different production scenarios, including different water cut and reservoir pressure values. The results showed that GL can significantly increase oil production under all scenarios. The study also found that most wells in the field will soon be closed due to high water cuts. Howev
... Show MoreThe article considers the main reason for A. I. Herzen's address to obsolete words, which is their ability to acquire a stylistic coloring in the context of speech, as well as the possibility of combining, in some cases, with neutral lexemes of various functional styles. A certain stylistic effect of such characteristics of this type of vocabulary is represented, as a result of which their stylistic coloring in syntagmatic terms does not coincide with stylistic coloring in terms of paradigmatics, that is, in speech they have a completely stylistic meaning. Attention is focused on the role of outdated vocabulary, which consists in the fact that they serve to implement such features of the artistic style as imagery, emotionality, and their
... Show MoreThis research investigated the effect of adding two groups of reinforcement materials, including bioactive materials Hydroxyapatite (HA) and halloysite nanoclay and bioinert materials Alumina (AL2O3) and Zirconia (ZrO2), each of them with various weight ratios (1,2,3,4 &5)% to the polymer matrix PMMA. The best ratios were selected, and then a hybrid was preparing Composite red from the best ratios from each group. Thermal properties, including thermal conductivity and Thermomechanical Analysis (TMA) technology, have been studied. The results showed that adding 3% Hydroxyapatite (HA) and 5% halloysite nanoclay to the polymethacrylate (PMMA) mer leads to an increase in thermal conductivity. It was also found from the Thermomechanical Analysis
... Show More