Preferred Language
Articles
/
MRamb4cBVTCNdQwChEop
Emotion Recognition System Based on Hybrid Techniques

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In addition, a bi-modal system for recognising emotions from facial expressions and speech signals is presented. This is important since one modality may not provide sufficient information or may not be available for any reason beyond operator control. To perform this, decision-level fusion is performed using a novel way for weighting according to the proportions of facial and speech impressions. The results show an average accuracy of 93.22 %.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Prediction of Fractional Hold-Up in RDC Column Using Artificial Neural Network

In the literature, several correlations have been proposed for hold-up prediction in rotating disk contactor. However,
these correlations fail to predict hold-up over wide range of conditions. Based on a databank of around 611
measurements collected from the open literature, a correlation for hold up was derived using Artificial Neiral Network
(ANN) modeling. The dispersed phase hold up was found to be a function of six parameters: N, vc , vd , Dr , c d m / m ,
s . Statistical analysis showed that the proposed correlation has an Average Absolute Relative Error (AARE) of 6.52%
and Standard Deviation (SD) 9.21%. A comparison with selected correlations in the literature showed that the
developed ANN correlation noticeably

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2012
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Maternal Serum Zinc level in pregnant women with second trimester induced abortion with anencephalic fetus

Background: Neural tube defects (NTD) are group of heterogeneous and complex congenital anomalies of the CNS. Commonly included in this group anencephaly, spina bifida and
encephaloceles. Anencephaly is the most severe defect; it is always lethal and results in stillbirth or early neonatal demise, is characterized by absence of the brain and cranium above the base of the skull and orbits
Objective: The objective of this study is to assess the relationship between maternal serum zinc level and anencephaly occurrence in women with second -trimester induced abortion due to anencephalic fetus.
Study design and setting: This study is a case- control study, carried out in Baghdad teaching hospital through

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Compression of an ECG Signal Using Mixed Transforms

Electrocardiogram (ECG) is an important physiological signal for cardiac disease diagnosis. With the increasing use of modern electrocardiogram monitoring devices that generate vast amount of data requiring huge storage capacity. In order to decrease storage costs or make ECG signals suitable and ready for transmission through common communication channels, the ECG data
volume must be reduced. So an effective data compression method is required. This paper presents an efficient technique for the compression of ECG signals. In this technique, different transforms have been used to compress the ECG signals. At first, a 1-D ECG data was segmented and aligned to a 2-D data array, then 2-D mixed transform was implemented to compress the

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Sat Aug 18 2018
Journal Name
Journal Of Engineering And Applied Sciences
Performance Evaluation of Transport Protocols for Mobile Ad Hoc Networks

Mobile Ad hoc Networks (MANETs) is a wireless technology that plays an important role in several modern applications which include military, civil, health and real-time applications. Providing Quality of Service (QoS) for this application with network characterized by node mobility, infrastructure-less, limitation resource is a critical issue and takes greater attention. However, transport protocols effected influential on the performance of MANET application. This study provides an analysis and evaluation of the performance for TFRC, UDP and TCP transport protocols in MANET environment. In order to achieve high accuracy results, the three transport protocols are implemented and simulated with four different network topology which are 5, 10

... Show More
View Publication
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Encryption Symmetric secret Key in Wireless Sensor Network Using AES Algorithm

      Wireless sensor network (WSN) security is an important component for protecting data from an attacker. For improving security, cryptography technologies are divided into two kinds: symmetric and asymmetric. Therefore, the implementation of protocols for generating a secret key takes a long time in comparison to the sensor’s limitations, which  decrease network throughput because they are based on an asymmetric method. The asymmetric algorithms are complex and decrease network throughput. In this paper, an encryption symmetric secret key in wireless sensor networks (WSN) is proposed. In this work, 24 experiments are proposed, which are encryption using the AES algorithm in the cases of 1 key, 10 keys, 25 keys, and 50 keys. I

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Epidemiological Complex Networks: A Survey

     In this review paper, several research studies were surveyed to assist future researchers to identify available techniques in the field of infectious disease modeling across complex networks. Infectious disease modelling is becoming increasingly important because of the microbes and viruses that threaten people’s lives and societies in all respects. It has long been a focus of research in many domains, including mathematical biology, physics, computer science, engineering, economics, and the social sciences, to properly represent and analyze spreading processes. This survey first presents a brief overview of previous literature and some graphs and equations to clarify the modeling in complex networks, the detection of societie

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
A Study of Graph Theory Applications in IT Security

The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.

This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Re

... Show More
Scopus (5)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Planner And Development
The Quantitative Analysis To Assess The Efficiency Of The Transport Network In Sader City

     This research examines the quantitative analysis to assess the efficiency of the transport network in Sadr City, where the study area suffers from a large traffic movement  for the variability of traffic flow and intensity at peak hours as a result of inside traffic and outside of it, especially in the neighborhoods of population with  economic concentration.                                                           &n

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 31 2022
Journal Name
Iraqi Geological Journal
Development of Artificial Intelligence Models for Estimating Rate of Penetration in East Baghdad Field, Middle Iraq

It is well known that the rate of penetration is a key function for drilling engineers since it is directly related to the final well cost, thus reducing the non-productive time is a target of interest for all oil companies by optimizing the drilling processes or drilling parameters. These drilling parameters include mechanical (RPM, WOB, flow rate, SPP, torque and hook load) and travel transit time. The big challenge prediction is the complex interconnection between the drilling parameters so artificial intelligence techniques have been conducted in this study to predict ROP using operational drilling parameters and formation characteristics. In the current study, three AI techniques have been used which are neural network, fuzzy i

... Show More
Crossref