Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials
...Show More Authors
In this research, a study is introduced on the effect of several environmental factors on the performance of an already constructed quality inspection system, which was designed using a transfer learning approach based on convolutional neural networks. The system comprised two sets of layers, transferred layers set from an already trained model (DenseNet121) and a custom classification layers set. It was designed to discriminate between damaged and undamaged helical gears according to the configuration of the gear regardless to its dimensions, and the model showed good performance discriminating between the two products at ideal conditions of high-resolution images. So, this study aimed at testing the system performance at poo
... Show MoreIntroduction: Carrier-based gutta-percha is an effective method of root canal obturation creating a 3-dimensional filling; however, retrieval of the plastic carrier is relatively difficult, particularly with smaller sizes. The purpose of this study was to develop composite carriers consisting of polyethylene (PE), hydroxyapatite (HA), and strontium oxide (SrO) for carrier-based root canal obturation. Methods: Composite fibers of HA, PE, and SrO were fabricated in the shape of a carrier for delivering gutta-percha (GP) using a melt-extrusion process. The fibers were characterized using infrared spectroscopy and the thermal properties determined using differential scanning calorimetry. The elastic modulus and tensile strength tests were dete
... Show MoreThis work aimed to study the effect of laser surface treatment on the mechanical characteristics and corrosion behaviour of grey cast iron type A159. Many technical applications used conventional surface treatment, but laser surface hardening has recently been used to enhance the surface properties of many alloys. The mechanical characteristics, including microstructure, microhardness, and wear resistance of A159 grey cast iron, were studied, in addition to corrosion behaviour. The experimental laser parameters in this work were 0.9, 1.2, and 1.5 KW power with continuous wave carbon dioxide lasers with scanning speeds of 10 and 12 mm/s were used. The results found that phase-transitional alterations in microstructure were influenced by lase
... Show MoreIn this study, Iraqi bentonite taken from Trefawi area/ Al-Anbar region province/ Iraq, was activated to enhance its rheological and filtration properties and increase its quality by decreasing the non-clay minerals (impurities), in order to be used in Iraqi oil companies instead of commercial bentonite. Bentonite was characterized by X-ray diffraction (XRD), X-ray fluorescence (XRF) and particle size distribution (PSD) before and after activation to show the effects on its mineral and chemical properties. The rheological properties of bentonite were enhanced by using different weights (0.4, 0.5, 0.6, 0.7 and 0.8 gm) of sodium carbonate (Na₂CO₃), whereas the filtration properties were enhanced by using different weights (0.5
... Show MoreHate speech (henceforth HS) has recently spread and become an important issue. This type of speech in children's writings has a particular formulation and specific objectives that the authors intend to convey. Thus, the study aims at examining qualitatively and quantitatively the classism HS and its pragmatic functions via identifying the speech acts used to express classism HS, the implicature instigated as well as impoliteness. Since pragmatics is the study of language in context, which is greatly related to the situations and speaker’s intention, this study depends on pragmatic theoriespeech acts, impoliteness and conversational implicature) to analyze the data which are taken from Katherine Mansfield's short story (The D
... Show MoreIn this article, a numerical study of compressible and weak compressible Newtonian flows is achieved for a time marching, Galerkin algorithm. A comparison between two numerical techniques for such flows, namely the artificial compressibility method (AC–method) and the fully artificial compressibility method (FAC–method) is performed. In the first artificial compressibility parameter ( is added to the continuity equation, while this parameter is added to both continuity and momentum equations in the second technique. This strategy is implemented to treat the governing equations of Newtonian flow in cylindrical coordinates (axisymmetric). Particularly, this study concerns with the effect of the artificial compressibility p
... Show MoreThe Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show More