Preferred Language
Articles
/
sRaWl4cBVTCNdQwCq1cQ
Implementing a novel approach an convert audio compression to text coding via hybrid technique
...Show More Authors

Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio files, by converting an audio file in to a text file and then compressing the new text file by using the common compression techniques is 6-bit coding algorithm its used to convert a digitized Audio file into a text file it is show that a good compression ratio between 15-35 %.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jul 31 2025
Journal Name
Computers, Materials & Continua
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
...Show More Authors

The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Feb 07 2022
Journal Name
مجلة الدراسات الاقتصادية والادارية
Measuring readiness to accomplish organizational change through personal characteristics: Crisis management approach: An exploratory study of the opinions of a sample of managers at Central Technical
...Show More Authors

The self-evident truth existing in today's business environment is the continuity of change and its continuity and turmoil, also its increase over time as it is more abundant, abundant, wide and complex than ever before, and it is the dominant feature in the business environment, as different organizations and operating units can find themselves shifting from the top to the bottom. And then it requires its departments to strive to adapt to these rapid and turbulent shifts and changes by bringing about a series of organizational and adaptive changes that are not limited to one organizational aspect only but rather include all organizational components. Accordingly, this research came to determine the readiness of public organizations to chan

... Show More
Publication Date
Fri Sep 15 2017
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Graph-Based Text Representation: A Survey of Current Approaches
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Electronic Security And Digital Forensics
LSB based audio steganography preserving minimum sample SNR
...Show More Authors

View Publication
Scopus (4)
Scopus Crossref
Publication Date
Tue Aug 02 2022
Journal Name
Dirasat: Human And Social Sciences
Denotation of Narrative Features in Television Advertising (A Semiotic Approach to Mr. President's Declaration)
...Show More Authors

The research summarizes the knowledge of the dimensions and denotations of T.V advertisement; and its constituents for building it through the semiotic approach of an ad sample represented by the announcement of Zain Kuwait Telecom Company which carries the title "Mr. President" using Roland Barth's approach, starting with the designation, implicit, and linguistic reading to reach the narrative features and their denotations. That makes television advertising as a semiotic and pragmatic discourse in view of the still and motion picture with its efficiency and strength to inform and communicate. And what lies in it of aesthetic, artistic elements; informational and effective power in influencing the recipients by focusing on narratives and a

... Show More
View Publication
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Al–bahith Al–a'alami
Spiritual Communication in Sufi Discourse- A communicative –Semiotic Approach to the Sufi Symbolic Image
...Show More Authors

This paper deals with a central issue in the field of human communication and reveals the roaming monitoring of the incitement and hatred speech and violence in media, its language and its methods. In this paper, the researcher seeks to provide a scientific framework for the nature of the discourse of incitement, hatred speech, violence, and the role that media can play in solving conflicts with their different dimensions and in building community peace and preventing the emergence of conflicts among different parties and in different environments. In this paper, the following themes are discussed:
The root of the discourse of hatred and incitement
The nature and dimensions of the discourse of incitement and hatred speech
The n

... Show More
View Publication
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Building a Sustainable GARCH Model to Forecast Rubber Price: Modified Huber Weighting Function Approach
...Show More Authors

The unstable and uncertain nature of natural rubber prices makes them highly volatile and prone to outliers, which can have a significant impact on both modeling and forecasting. To tackle this issue, the author recommends a hybrid model that combines the autoregressive (AR) and Generalized Autoregressive Conditional Heteroscedasticity (GARCH) models. The model utilizes the Huber weighting function to ensure the forecast value of rubber prices remains sustainable even in the presence of outliers. The study aims to develop a sustainable model and forecast daily prices for a 12-day period by analyzing 2683 daily price data from Standard Malaysian Rubber Grade 20 (SMR 20) in Malaysia. The analysis incorporates two dispersion measurements (I

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
5th International Conference On Biomedical And Health Sciences
Exploiting Vpusm 8 Lytic Phage for The Bio- Control of V. Cholerae: A Novel Approach Against Cholera in The Era of Antibiotic Resistance
...Show More Authors

Objective: The purpose of this study was to assess the effectiveness of Vibriophage Universiti Sains Malaysia 8 (VPUSM 8), a bacteriophage that destroys bacteria, in managing the proliferation of Vibrio cholerae, specifically the El Tor serotype, as an alternate therapeutic strategy. Methods: The study entailed subjecting water samples from Kelantan, Malaysia, to reproduce the natural circumstances that promote the growth of V. cholerae. Subsequently, the samples were contaminated with the V. cholerae O1 El Tor Inaba strain and treated using VPUSM 8. The study employed a controlled experimental design, wherein the samples were divided into three groups, each experiencing different treatment methods. Quantifying the number of colony-

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Cybersecurity And Information Management
A New Automated System Approach to Detect Digital Forensics using Natural Language Processing to Recommend Jobs and Courses
...Show More Authors

A resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref

... Show More
View Publication
Scopus Crossref