Preferred Language
Articles
/
9RZceIsBVTCNdQwCa8vw
Robust speaker verification by combining MFCC and entrocy in noisy conditions
...Show More Authors

Automatic speaker recognition may achieve remarkable performance in matched training and test conditions. Conversely, results drop significantly in incompatible noisy conditions. Furthermore, feature extraction significantly affects performance. Mel-frequency cepstral coefficients MFCCs are most commonly used in this field of study. The literature has reported that the conditions for training and testing are highly correlated. Taken together, these facts support strong recommendations for using MFCC features in similar environmental conditions (train/test) for speaker recognition. However, with noise and reverberation present, MFCC performance is not reliable. To address this, we propose a new feature 'entrocy' for accurate and robust speaker recognition, which we mainly employ to support MFCC coefficients in noisy environments. Entrocy is the fourier transform of the entropy, a measure of the fluctuation of the information in sound segments over time. Entrocy features are combined with MFCCs to generate a composite feature set which is tested using the gaussian mixture model (GMM) speaker recognition method. The proposed method shows improved recognition accuracy over a range of signal-to-noise ratios.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 10 2018
Journal Name
Indian Journal Of Natural Sciences
Verification the Pollution of Tigris River in South of Baghdad using Remote Sensing Techniques
...Show More Authors

This paper describes the use of remote sensing techniques in verification of the polluted area in Diyala River and Tigris River and the effected of AL-Rustamiyah wastewater treatment plant, which is located on Diyala River, one of the branches of Tigris River in south of Baghdad. SPOT-5 a French satellite image of Baghdad, Iraq was used with ground resolution of 2.5 m in May 2016. ENVI 5.1 software programming was utilized for Image processing to assess the water pollution of Diyala and Tigris River’s water. Five regions were selected from a study area and then classified using the unsupervised ISODATA method. The results indicated that four classes of water quality which are successful in assessing and mapping water pollution which confi

... Show More
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Comparison Study between Iraqi Conditions of Contract and FIDIC Conditions- The Red Book
...Show More Authors

Reconstruction in Iraq requires coherent legitimate frameworks that are able to detail obligations, rights and responsibilities of the parties participating in reconstruction projects, regardless their type or delivery system.
Conditions of Contract can be considered an important component of these frameworks. This paper investigates flexibility and appropriateness of the application of Iraqi conditions of contract in reconstruction projects. These conditions were compared to FIDIC Conditions. The objective wasn't comparing individual clauses, but rather exploring the principles and philosophy laying behind each conditions, and to what extent each conditions care about realizing equity between main contract parties. Validity of applic

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Feb 15 2023
Journal Name
Remote Sensing
Combining Remote Sensing Approaches for Detecting Marks of Archaeological and Demolished Constructions in Cahokia’s Grand Plaza, Southwestern Illinois
...Show More Authors

Remote sensing data are increasingly being used in digital archaeology for the potential non-invasive detection of archaeological remains. The purpose of this research is to evaluate the capability of standalone (LiDAR and aerial photogrammetry) and integration/fusion remote sensing approaches in improving the prospecting and interpretation of archaeological remains in Cahokia’s Grand Plaza. Cahokia Mounds is an ancient area; it was the largest settlement of the Mississippian culture located in southwestern Illinois, USA. There are a limited number of studies combining LiDAR and aerial photogrammetry to extract archaeological features. This article, therefore, combines LiDAR with photogrammetric data to create new datasets and inv

... Show More
View Publication
Scopus (5)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Nov 20 2028
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETERMINATION OF OPTIMAL CONDITIONS FOR CAROTENOIDS PRODUCTION BY CHEMICAL MUTANAT LOCAL ISOLATE RHODOTORUL MUCILAGENOSA M.: DETERMINATION OF OPTIMAL CONDITIONS FOR CAROTENOIDS PRODUCTION BY CHEMICAL MUTANAT LOCAL ISOLATE RHODOTORUL MUCILAGENOSA M.
...Show More Authors

The aim of this study was to increasing natural carotenoides production by a locally isolate Rodotorula mucilagenosa M. by determination of the optimal conditions for growth and production of this agents, for encouragest to use it in food application permute artificial pigments which harmfull for consumer health and envieronmental. The optimal condition of carotenoides production from Rhodotorula mucilaginosa M were studied. The results shows the best carbon and nitrogen source were glucose and yeast extract. The carotenoids a mount production was 47430 microgram ̸ litter and 47460 microgram ̸ litter, respectively, and the optimum temperature was 30°C, PH 6, that the carotenoides a mount was 47470 microgram ̸ litter and 47670 microgr

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Fuzzy Robust Estimation For Location Parameter
...Show More Authors

 In this paper, we introduce three robust fuzzy estimators of a location parameter based on Buckley’s approach, in the presence of outliers. These estimates were compared using the variance of fuzzy numbers criterion, all these estimates were best of Buckley’s estimate. of these, the fuzzy median was the best in the case of small and medium sample size, and in large sample size, the fuzzy trimmed mean was the best.

View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Offline Signature Biometric Verification with Length Normalization using Convolution Neural Network
...Show More Authors

Offline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Jordanian Journal Of Computers And Information Technology
BEYOND WORDS: HARNESSING SPEECH SOUND FOR SPEAKER AGE AND GENDER DETECTION USING 1D CNN ARCHITECTURE WITH SELF-ATTENTION MECHANISM
...Show More Authors

Beyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attentio

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Apr 28 2021
Journal Name
2021 1st Babylon International Conference On Information Technology And Science (bicits)
An Efficient Method for Stamps Verification Using Haar Wavelet Sub-bands with Histogram and Moment
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref