The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreBackground/objectives: To study the motion equation under all perturbations effect for Low Earth Orbit (LEO) satellite. Predicting a satellite’s orbit is an important part of mission exploration. Methodology: Using 4th order Runge–Kutta’s method this equation was integrated numerically. In this study, the accurate perturbed value of orbital elements was calculated by using sub-steps number m during one revolution, also different step numbers nnn during 400 revolutions. The predication algorithm was applied and orbital elements changing were analyzed. The satellite in LEO influences by drag more than other perturbations regardless nnn through semi-major axis and eccentricity reducing. Findings and novelty/improvement: The results demo
... Show MoreSuffer most of the industrial sector companies from high Kperfi magnitude of the costs of industrial indirect, lack of equitable distribution of these costs on the objectives of cost, increased competition, and the lack of proper planning in line and changes faced by the industrial sector (general) and sample (private), as well as the difficulty in re- directing efforts to improve profitability and in-depth analysis of activities, and to identify untapped resource activities, then link these activities to the final products The research aims to apply the technology review and evaluate programs with the method (ABC) through the application stages of planning, scheduling and control and a comparison to get to the products of dev
... Show MoreZnS nanoparticles were prepared by a simple microwave irradiation method under mild condition. The starting materials for the synthesis of ZnS quantum dots were zinc acetate (R & M Chemical) as zinc source, thioacetamide as a sulfur source and ethylene glycol as a solvent. All chemicals were analytical grade products and used without further purification. The quantum dots of ZnS with cubic structure were characterized by X-ray powder diffraction (XRD), the morphology of the film is seen by scanning electron microscopy (SEM). The particle size is determined by field effect scanning electron microscopy (FESEM), UV-Visible absorption spectroscopy and XRD. UV-Visible absorption spectroscopy analysis shows that the absorption peak of the as-prep
... Show MoreThe paper probes into minute identification of the data of the methods followed in the electronic newspapers that aim to promote terrorist organizations like Al Qaeda and ISIS to draw emotional empathy and sympathy with them.
The paper aims at identifying:
How emotional empathy was utilized by terrorists in E-newspapers.
How useful utilizing emotional empathy was in attracting supporters. The sample that is used in the paper is based on the opening articles of E-newspapers that propagate Al Qaeda and ISIS, e.g. (Sawtu el jihad) “The Sound of Fighting in the Name of God”, (Mua’skar el Battar wal Shamikha wal Khansaa) “Camps of Al Battar, Shamika, and Khansaa”, “Inspire” and (Thurwatu el Sanam, Dabiq, and Rumiyah)
Power switches require snubbing networks for driving single – phase industrial heaters. Designing these networks, for controlling the maximum allowable rate of rise of anode current (di/dt) and excessive anode – cathode voltage rise (dv/dt) of power switching devices as thyristors and Triacs, is usually achieved using conventional methods like Time Constant Method (TCM), resonance Method (RM), and Runge-Kutta Method (RKM). In this paper an alternative design methodology using Fuzzy Logic Method (FLM) is proposed for designing the snubber network to control the voltage and current changes. Results of FLM, with fewer rules requirements, show the close similarity with those of conventional design methods in such a network of a Triac drivin
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show More