Preferred Language
Articles
/
ChZUZYoBVTCNdQwCdJ3M
Hybrid Techniques based Speech Recognition
...Show More Authors

Information processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (Ecl) distance match performance is (62%) in MWM. So, in speech recognition to get the high alignment and high performance one must use DTW distance measurement.

Crossref
View Publication
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Engineering
The Most Influential Factor on the Stumble and Failure of the governmental Projects
...Show More Authors

The governmental projects are considers the prevailing in Iraq, as most of the projects implemented by the Government, the major role played by governmental projects in the provision of services to citizens and improve the economic situation in the country in general, in addition to the huge number of these projects implemented by the governmental organizations and the large failure rates of it , and because of the fact that these projects are stumbled  before they reach the stage of failure, The aim of this research to identify the main factors for the stumble projects in addition to identifying the most influential factor on the causes and consequences of it , like (cost overruns , time overruns , delay and scope

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Science
A Reconnaissance Study of Rare Earth Elements Systematic in Phosphate Coprolites: Comparison between Continental Shelf and Intracontinental Basin Deposits
...Show More Authors

     The behavior of rare earth elements (REE) in phosphate coprolites; deposited in marine upwelling shelf system (Iraq) and a condensed section of the intracontinental basin (Czech Republic) is compared and discussed in the present study. The eight coprolite samples show that the REE incorporated in the apatite of these phosphatized faecal trace fossils have significantly different behavior in the two sedimentary regimes and hold the REE source’s signature in the local sedimentary conditions. The behavior of heavy REE, light REE, Ce-anomaly and shale-normalized ratios of Ce/La, Sm/Yb and Pr/Ce can be mainly attributed to REE fractionation at the source. In contrast, middle REE enrichment may be attributed to local fractionation b

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Jul 10 2023
Journal Name
Journal Of Engineering
Theoretical Evaluation of Solar Assisted Desiccant Cooling System for a Small Meeting-Hall
...Show More Authors

The performance of a solar assisted desiccant cooling system for a meeting-hall located in the College of Engineering/University of Baghdad was evaluated theoretically. The system was composed of four components; a solar air heater, a desiccant dehumidifier, a heat exchanger and an evaporative cooler. A computer simulation was developed by using MATLAB to assess the effect of various design and operating conditions on the performance of the system and its components. The actual weather data on recommended days were used to assess the load variation and the system performance during those days. The radiant time series method (RTS) was used to evaluate the hourly variation of the cooling load. Four operation modes were employed for perform

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Iraqi Journal Of Hematology
Detection of active human cytomegalovirus in patients with multiple myeloma
...Show More Authors
Abstract:<sec><title>BACKGROUND:

Human cytomegalovirus (HCMV) infection is ubiquitous and successfully reactivated in patients with immune dysfunction as in patient with multiple myeloma (MM), causing a wide range of life-threatening diseases. Early detection of HCMV and significant advances in MM management has amended patient outcomes and prolonged survival rates.

OBJECTIVES:

The aim of the study was to estimate the frequency of active HCMV in MM patients.

MATERIALS AND METHODS:

This is a case–control study involved 50 MM patients attending Hematology Center, Bag

... Show More
View Publication
Clarivate Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Semigroup Theory for Dual Dynamic Programming
...Show More Authors

In this paper, the nonclassical approach to dynamic programming for the optimal control problem via strongly continuous semigroup has been presented. The dual value function VD ( .,. ) of the problem is defined and characterized. We find that it satisfied the dual dynamic programming principle and dual Hamilton Jacobi –Bellman equation. Also, some properties of VD (. , .) have been studied, such as, various kinds of continuities and boundedness, these properties used to give a sufficient condition for optimality. A suitable verification theorem to find a dual optimal feedback control has been proved. Finally gives an example which illustrates the value of the theorem which deals with the sufficient condition for optimality.

<

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 16 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using Travelling Salesman Principle to Evaluate the Minimum Total Cost of the Iraqi Cities
...Show More Authors

The traveling salesman problem (TSP) is a well-known and important combinatorial optimization problem. The goal is to find the shortest tour that visits each city in a given list exactly once and then returns to the starting city. In this paper we exploit the TSP to evaluate the minimum total cost (distance or time) for Iraqi cities. So two main methods are investigated to solve this problem; these methods are; Dynamic Programming (DP) and Branch and Bound Technique (BABT). For the BABT, more than one lower and upper bounds are be derived to gain the best one. The results of BABT are completely identical to DP, with less time for number of cities (n), 5 ≤ n ≤ 25. These results proof the efficiency of BABT compared with so

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
DEO: A Dynamic Event Order Strategy for t-way Sequence Covering Array Test Data Generation
...Show More Authors

Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of cove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
Multi-layer Multi-objective Evolutionary Algorithm for Adjustable Range Set Covers Problem in Wireless Sensor Networks
...Show More Authors

Establishing complete and reliable coverage for a long time-span is a crucial issue in densely surveillance wireless sensor networks (WSNs). Many scheduling algorithms have been proposed to model the problem as a maximum disjoint set covers (DSC) problem. The goal of DSC based algorithms is to schedule sensors into several disjoint subsets. One subset is assigned to be active, whereas, all remaining subsets are set to sleep. An extension to the maximum disjoint set covers problem has also been addressed in literature to allow for more advance sensors to adjust their sensing range. The problem, then, is extended to finding maximum number of overlapped set covers. Unlike all related works which concern with the disc sensing model, the cont

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 05 2019
Journal Name
Iraqi Journal Of Physics
Functionalization of single and multi-walled carbon nanotubes by chemical treatment
...Show More Authors

In this work we experimentally investigated SWCNTs and MWCNTs to increase their thermal conductivity and electrically functionalization process using different reagents ((nitric acid, HNO3 followed by acid treatment with H2SO4), then washed with deionized water (DW) and then treated with H2O2 via ultrasonic technique. Then repeated the steps with MWCNTs and compare their results in an effort to improve experimental conditions that efficiently differentiate the surface of the single walled carbon nanotubes (SWCNTs) and multi walled carbon nanotubesi(MWCNTs) that less nanotubes destroy and to enhance the properties of them and also to reduce aggregation in liquid. the results were prove by XRD, and infrared spectroscopy (FTIR). The FTIR sp

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Feb 14 2025
Journal Name
International Journal Of Engineering &amp; Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref