This work is licensed under a Creative Commons Attribution 4.0 International License. Abstract This study examines the working capital management
In this article, the research presents a general overview of deep learning-based AVSS (audio-visual source separation) systems. AVSS has achieved exceptional results in a number of areas, including decreasing noise levels, boosting speech recognition, and improving audio quality. The advantages and disadvantages of each deep learning model are discussed throughout the research as it reviews various current experiments on AVSS. The TCD TIMIT dataset (which contains top-notch audio and video recordings created especially for speech recognition tasks) and the Voxceleb dataset (a sizable collection of brief audio-visual clips with human speech) are just a couple of the useful datasets summarized in the paper that can be used to test A
... Show MoreThe study dealt with measuring the impact of the availability of each of the content elements of the interaction, electronic services, and information on the evaluation of the users of the government website for its effectiveness in terms of the site’s functions and for measuring the site’s ability to present the organization’s tasks to customer groups.
Authority is concerned with measuring the confidence of customers in the content of the site, and in the organization as a whole. Validity is related to measuring the effectiveness of employing the site’s content to achieve the goal of its creation and in communicating with customers. Availability It is for measuring the ease of use of the site. The relevance, which means
... Show MoreThe study aims to clarify the truth of hearing the dead, and then the statement of the legitimate judgment of the indoctrination, by reference to the evidence contained in that regard, and try to combine and reconcile those evidence, and the study finds that the most correct in the matter of hearing is to say hearing the dead in the will of God and how Almighty teaches , As up to that indoctrination of the dead is permissible, so as to combine evidence.
There are two main categories of force control schemes: hybrid position-force control and impedance control. However, the former does not take into account the dynamic interaction between the robot’s end effector and the environment. In contrast, impedance control includes regulation and stabilization of robot motion by creating a mathematical relationship between the interaction forces and the reference trajectories. It involves an energetic pair of a flow and an effort, instead of controlling a single position or a force. A mass-spring-damper impedance filter is generally used for safe interaction purposes. Tuning the parameters of the impedance filter is important and, if an unsuitable strategy is used, this can lead to unstabl
... Show MoreIn this paper, an Integral Backstepping Controller (IBC) is designed and optimized for full control, of rotational and translational dynamics, of an unmanned Quadcopter (QC). Before designing the controller, a mathematical model for the QC is developed in a form appropriate for the IBC design. Due to the underactuated property of the QC, it is possible to control the QC Cartesian positions (X, Y, and Z) and the yaw angle through ordering the desired values for them. As for the pitch and roll angles, they are generated by the position controllers. Backstepping Controller (BC) is a practical nonlinear control scheme based on Lyapunov design approach, which can, therefore, guarantee the convergence of the position tracking
... Show MoreWith occurrence of any financial crises, regardless at global or regional levels such as the great economic crises during 1929 – 1933 and the Asian financial crises at the end of twentieth century as well as the current global financial crises that started during second half 2008, we acknowledge that there are some critics loudly articulated accusing accountants and auditors for disparences, and they are numerical partner of financial manipulation as well as corrupted administrators with the company's administrators that they are difficulty. At this point, many suggestions and recommendation for upgrading the accounting system has been made.  
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MorePermeability estimation is a vital step in reservoir engineering due to its effect on reservoir's characterization, planning for perforations, and economic efficiency of the reservoirs. The core and well-logging data are the main sources of permeability measuring and calculating respectively. There are multiple methods to predict permeability such as classic, empirical, and geostatistical methods. In this research, two statistical approaches have been applied and compared for permeability prediction: Multiple Linear Regression and Random Forest, given the (M) reservoir interval in the (BH) Oil Field in the northern part of Iraq. The dataset was separated into two subsets: Training and Testing in order to cross-validate the accuracy
... Show MoreTheoretical and experimental investigations of free convection through a cubic cavity with sinusoidal heat flux at bottom wall, the top wall is exposed to an outside ambient while the other walls are adiabatic saturated in porous medium had been approved in the present work. The range of Rayleigh number was and Darcy number values were . The theoretical part involved a numerical solution while the experimental part included a set of tests carried out to study the free convection heat transfer in a porous media (glass beads) for sinusoidal heat flux boundary condition. The investigation enclosed values of Rayleigh number (5845.6, 8801, 9456, 15034, 19188 and 22148) and angles of inclinations (0, 15, 30, 45 and 60 degree). The numerical an
... Show More