The theories and applications of speaker identification, recognition, and verification are among the well-established fields. Many publications and advances in the relevant products are still emerging. In this paper, research-related publications of the past 25 years (from 1996 to 2020) were studied and analysed. Our main focus was on speaker identification, speaker recognition, and speaker verification. The study was carried out using the Science Direct databases. Several references, such as review articles, research articles, encyclopaedia, book chapters, conference abstracts, and others, were categorized and investigated. Summary of these kinds of literature is presented in this paper, together with statistical analyses
... Show MoreA series of 4-(methylsulfonyl)aniline derivatives were synthesized in order to obtain new compounds as a potential anti-inflammatory agents with expected selectivity against COX-2 enzyme. In vivo acute anti-inflammatory activity of the final compounds 11–14 was evaluated in rat using an egg-white induced edema model of inflammation in a dose equivalent to 3 mg/Kg of diclofenac sodium. All tested compounds produced significant reduction of paw edema with respect to the effect of propylene glycol 50% v/v (control group). Moreover, the activity of compounds 11 and 14 was significantly higher than that of diclofenac sodium (at 3 mg/Kg) in the 120–300 minute time interval, while compound 12 expressed a comparable effect to that of di
... Show MoreThis research deals with the financial reporting for non-current assets impairment from the viewpoint of international accounting standards, particularly IAS 36 "Impairment of non-current assets." The research problems focus on the presence of internal and external indicators on impairment of non-current assets in many of companies listed in Iraqi stock exchange. So it is required to apply IAS 36 to reporting for the impairment loss of assets since this impairment impact certain financial indicators. These indicators help users in their decision-making and forecasting future financial situation and the ability of the company to achieve future profits or maintain current profits. The research aims to shedding lig
... Show MoreSultan Said bin Sultan bin Ahmed bin Said Al-Busaidi (1223-1273 AH / 1806-1856 AD) was able to rule Oman and Zanzibar in a unified Arab-African state during his reign. However, it was separated for several reasons. Thus, the study aims to clarify the efforts made by Sultan Said for annexing Zanzibar to Oman, establishing the Arab-African Sultanate, and shedding light on the role played by Britain in dividing the Arab-African Sultanate and separating Zanzibar from the Omani rule in (1275 AH-1861 AD). The study has adopted the historical descriptive analytical approach. The study has reached several conclusions, such as: The economic motivators were the most important factors that pushed Sultan Said to move his capital from Muscat to
... Show MoreThe current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreThis paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,
... Show More