Preferred Language
Articles
/
8hYDe4cBVTCNdQwClFPP
Speech Emotion Recognition Using Minimum Extracted Features
...Show More Authors

Recognizing speech emotions is an important subject in pattern recognition. This work is about studying the effect of extracting the minimum possible number of features on the speech emotion recognition (SER) system. In this paper, three experiments performed to reach the best way that gives good accuracy. The first one extracting only three features: zero crossing rate (ZCR), mean, and standard deviation (SD) from emotional speech samples, the second one extracting only the first 12 Mel frequency cepstral coefficient (MFCC) features, and the last experiment applying feature fusion between the mentioned features. In all experiments, the features are classified using five types of classification techniques, which are the Random Forest (RF), k-Nearest Neighbor (k-NN), Sequential Minimal Optimization (SMO), Naïve Bayes (NB), and Decision Tree (DT). The performance of the system validated over Surrey Audio-Visual Expressed Emotion (SAVEE) dataset for seven emotions. The results of the experiments showed given good accuracy compared with the previous studies using a fusion of a few numbers of features with the RF classifier.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Extraction of Chlorophyll from Alfalfa Plant
...Show More Authors

The extraction process of chlorophyll from dehydrated and pulverized alfalfa plant were studied by percolation method. Two  solvent systems were used for the extraction namely; Ethanol-water and Hexane-Toluene systems . The effect of circulation rate, solvent concentration, and solvent volume to solid weight ratio were studied. In  both ethanol water, and Hexane-Toluene systems it appears that solvent concentration is the most effective variable.

 

 

View Publication Preview PDF
Publication Date
Sun Dec 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Effect of Solvent Extraction of Light Lubricating Oil on Viscosity Index and Chemical Composition
...Show More Authors

An investigation was conducted for the improvement of viscosity index of light lubricating oil fraction (40 stock)
obtained from vacuum distillation unit of lube oil plant of Daura Refinery, using solvent extraction process.
In this study furfural solvent was used to extract the undesirable materials which reduce the viscosity index of raw
lubricating oil fraction.
The studied effecting variables of extraction were extraction temperature range from 70 to 110°C, and solvent to oil
ratio range from 1:1 to 4:1 (wt/wt).
The n-d-M method was used for calculation of carbon distribution and structural group analysis of the raffinate
produced from furfural extraction.
Also the three component phase diagram for a mixed-ba

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2022
Journal Name
Iraqi Journal Of Applied Physics
Fabrication of Solid Random Gain Media in Visible Region From Rhodamine Dye Solutions Containing Highly-Pure Titanium Dioxide Nanoparticles
...Show More Authors

In this work, solid random gain media were fabricated from laser dye solutions containing nanoparticles as scattering centers. Two different rhodamine dyes (123 and 6G) were used to host the highly-pure titanium dioxide nanoparticles to form the random gain media. The spectroscopic characteristics (mainly fluorescence) of these media were determined and studied. These random gain media showed laser emission in the visible region of electromagnetic spectrum. Fluorescence characteristics can be controlled to few nanometers by adjusting the characteristics of the host and nanoparticles as well as the preparation conditions of the samples. Emission of narrow linewidth (3nm) and high intensity in the visible region (533-537nm) was obtained.

View Publication Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Al–bahith Al–a'alami
Photos of Women in Iraqi Feature Films after 2003
...Show More Authors

The research seeks to examine the image of women in Iraqi films produced after 2003 over the answer to questions such as “ level of the representation of women and appearing in films and features that are attributable to them and their relationships with men and their interests and tendencies , activities and ways and methods pursued to achieve their goals , or what appeared to be trying to achieve and whether made movies vivid and varied models for women, or confined to a rigid model and duplicate Is films raised issues concerning women? The research seeks to examine the image of women in Iraqi films produced after 2003 over the answer to questions such as “ level of the representation of women and appearing in films and features th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (32)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Tue Dec 09 2014
Journal Name
Journal Of The College Of Education For Women
A Stylistic Analysis of Bisson’s Bears Discover Fire
...Show More Authors

This paper aims at analyzing Terry Bisson’s short story Bears Discover Fire stylistically by following both Gerard Genette’s theory of narratology (1980) and Short and Leech (1981) strategy for analyzing fictional works. Also trying to examine to what extent these models are applicable in analyzing the selected story. Stylistic analysis procedures help the readers/researchers to identify specific linguistic features in order to support literary interpretation and appreciation of literary texts. Style in fiction concentrates not on what is written, but on how a text is written. Each writer has his own style and techniques which distinguish him from other writers

View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of The College Of Education For Women
A Pragmatic Study of Narcissism in the American Movie Big Eyes (2014)
...Show More Authors

Narcissism is a complicated phenomenon that can be reflected in the narcissist’s language. Investigating narcissism in terms of linguistics, and pragmatics in particular, does not seem to have been given its due attention, as this study reveals. Thus, this study is an endeavor to discover how narcissism is reflected in the American movie Big Eyes (2014). It is known for introducing narcissistic behaviors. This paper aims to identify the types, motivations, and pragmatic manifestations of narcissism in the selected movie. Three pragmatic theories are chosen to scrutinize narcissism in the data: Searle’s speech acts (1969), Grice’s maxims breaching (1975), and Culppeper’s impoliteness (1996). To cope with the nature of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 05 2015
Journal Name
Iraqi Journal Of Science
Antimicrobial and Antibiofilm Activity of Mango Seeds Extract
...Show More Authors

Mango fruit is one of the most nutritionally rich fruits with unique flavor, this fruit belonged to family of Anacardiaceae and it is an excellent source of vitamins specially vitamin A, carotene pigments and potassium. In this study the antimicrobial activity of mango seeds extract has been investigated against gram positive bacteria (Staphylococcus aureus and Bacillus spp.) and gram negative bacteria (Pseudomonas aeruginosa and E. coli) and yeast Candida albicans by well diffusion method in nutrient agar and the results were expressed as the diameter of bacterial inhibition zones surrounding the wells, and the antibiofilm of its extracts was observed against Staphylococcus aureus. The seeds extractions prepared by two solvents: 8

... Show More
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Enhancing the Compressive Strength and Density of Cement Mortar by the Addition of Different Alignments of Glass Fibers and Styrene Butadiene Rubber
...Show More Authors

Abstract

In the field of construction materials the glass reinforced mortar and Styrene Butadiene mortar are modern composite materials. This study experimentally investigated the effect of addition of randomly dispersed glass fibers and layered glass fibers on density and compressive strength of mortar with and without the presence of Styrene Butadiene Rubber (SBR). Mixtures of 1:2 cement/sand ratio and 0.5 water/cement ratio were prepared for making mortar. The glass fibers were added by two manners, layers and random with weight percentages of (0.54, 0.76, 1.1 and 1.42). The specimens were divided into two series: glass-fiber reinforced mortar without SBR and glass-fiber reinforced mortar with 7% SBR of mixture water. All s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More