Automatic speaker recognition may achieve remarkable performance in matched training and test conditions. Conversely, results drop significantly in incompatible noisy conditions. Furthermore, feature extraction significantly affects performance. Mel-frequency cepstral coefficients MFCCs are most commonly used in this field of study. The literature has reported that the conditions for training and testing are highly correlated. Taken together, these facts support strong recommendations for using MFCC features in similar environmental conditions (train/test) for speaker recognition. However, with noise and reverberation present, MFCC performance is not reliable. To address this, we propose a new feature 'entrocy' for accurate and robust speaker recognition, which we mainly employ to support MFCC coefficients in noisy environments. Entrocy is the fourier transform of the entropy, a measure of the fluctuation of the information in sound segments over time. Entrocy features are combined with MFCCs to generate a composite feature set which is tested using the gaussian mixture model (GMM) speaker recognition method. The proposed method shows improved recognition accuracy over a range of signal-to-noise ratios.
Pushover analysis is an efficient method for the seismic evaluation of buildings under severe earthquakes. This paper aims to develop and verify the pushover analysis methodology for reinforced concrete frames. This technique depends on a nonlinear representation of the structure by using SAP2000 software. The properties of plastic hinges will be defined by generating the moment-curvature analysis for all the frame sections (beams and columns). The verification of the technique above was compared with the previous study for two-dimensional frames (4-and 7-story frames). The former study leaned on automatic identification of positive and negative moments, where the concrete sections and steel reinforcement quantities the
... Show MoreThis work, aims to study and examine the description f the gradient reduced order-strategic sensors of type boundary exponential (-strategic sensors) for completion gradient order-detectability of type boundary exponential (-detectability). Thus, this concept is linked to an estimator in distributed parameter systems (DPSS) in Neumann problem. So,we present numerous consequences regarding to diverse kinds of information, region and conditions of boundary region to allow existence of -detectable systems. In addition,we have estimated at the junction interface that the interior solution isharmonizedwith the exterior solution for -detectable and, we give the relationship between this concept and sensors structures. F
... Show MoreThe study area is located in the eastern part of the Diyala Governorate close to the Iraqi-Iranian border. This study was set to investigate the hydrogeological calculations of northeast of Qazaniyah wells where the groundwater moves in directions of from the northeastern parts towards the southwestern par, that is, the same direction of the topography and the same direction of the tendency of the layers t. The study‘s region is characterized by visible geological layers or those that can be penetrated to a reasonable depth by wells which are sedimentary rocks deposited in continental or semi-continental conditions in the bays. From the study of the hydraulic properties of the two hydrogeological and exemplary systems, the values of tr
... Show MoreThe purpose of this research is to a treatment the impact of Views outliers to the estimators of a distributed arrival and service to the theory of queues and estimate the distribution parameters depending on the robust estimators, and when he was outliers greatest impact in the process of estimating the both distributions mentioned parameters, it was necessary to use way to test that does these data contain abnormal values or not? it was used the method ( Tukey ) for this purpose and is of the most popular ways to discover the outliers , it shows that there are views abnormal (outliers ) in the estimators of each of the distributional arrival and service, which have a significant impact on the calculation of these estimato
... Show MoreThe tested isolate of Rhizobium leguminosarum bv. viciae was isolated from root nodules of vicia faba plant from Baghdad ,the isolated bacteria was examined for bioemulsifier production when growing in mineral salt medium that containing 1% sunflower oil as sole carbon source . Rhizobium isolate was able to produce bioemulsifier with initial emulsification index E24% was 38%. Many of physical and nutritional cultural conditions for optimum emulsifier production was examined including : pH , temperature ,incubation period ,carbon and nitrogen source. The maximum bioemulsifier production form Rhizobium isolate was 64.5% when bacteria growing in mineral salt medium with pH 9 ,incubated at temperature 30 ºC , incubation period was 10 days ,
... Show MoreModern automation robotics have replaced many human workers in industrial factories around the globe. The robotic arms are used for several manufacturing applications, and their responses required optimal control. In this paper, a robust approach of optimal position control for a DC motor in the robotic arm system is proposed. The general component of the automation system is first introduced. The mathematical model and the corresponding transfer functions of a DC motor in the robotic arm system are presented. The investigations of using DC motor in the robotic arm system without controller lead to poor system performance. Therefore, the analysis and design of a Proportional plus Integration plus Divertive (PID) controller is illustrated.
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreComparisons of two life tables constructed to display alfaifa weevil Hypera posticoa (Gryllenhal), populations in southeentral Wisconsin, U. S. A. under epizootic and enzootic conditions of fungal diseasea, caused by Erynia phytonomi Arthur suggests that the “prepupal” stage provided the greates contribution to population changes under both conditions due to the high mortality rate. The principle mortality agents during this stage are E. phytonomi and the parasitoids complex of Bathyp1ectes curculionis and Buthyp1ectes anurus respectively under the two condition.