Voice Activity Detection (VAD) is considered as an important pre-processing step in speech processing systems such as speech enhancement, speech recognition, gender and age identification. VAD helps in reducing the time required to process speech data and to improve final system accuracy by focusing the work on the voiced part of the speech. An automatic technique for VAD using Fuzzy-Neuro technique (FN-AVAD) is presented in this paper. The aim of this work is to alleviate the problem of choosing the best threshold value in traditional VAD methods and achieves automaticity by combining fuzzy clustering and machine learning techniques. Four features are extracted from each speech segment, which are short term energy, zero-crossing rate, autocorrelation, and log energy. A modified version of fuzzy C-Means is then used to cluster speech segments into three clusters; two clusters for voice and one for unvoiced. After that, three feed forward neural networks are trained to adjust their weights, in which each network represents one cluster. To make the final decision regarding the class type of a given speech segment, the membership degrees of this segment in all clusters along with neural networks' decisions are given to a defuzzification step which finally gives the class type of that segment. The proposed FN-AVAD is tested on the public multimodal emotion database, Surrey AudioVisual Expressed Emotion (SAVEE), and the error rate was 2.08%. The achieved results are comparable to the results achieved by the current published works in the literature.
This study was focused on biotreatment of soil which polluted by petroleum compounds (Diesel) which caused serious environmental problems. One of the most effective and promising ways to treat diesel-contaminated soil is bioremediation. It is a choice that offers the potential to destroy harmful pollutants using biological activity.
Four bacterial strains were isolated from diesel contaminated soil samples. The isolates were identified by the Vitek 2 system, as Sphingomonas paucimobilis, Pentoae species, Staphylococcus aureus, and Enterobacter cloacae. The potential of biological surfactant production was tested using the Sigma 703D stand-alone tensiometer showed
... Show MoreThe process of accurate localization of the basic components of human faces (i.e., eyebrows, eyes, nose, mouth, etc.) from images is an important step in face processing techniques like face tracking, facial expression recognition or face recognition. However, it is a challenging task due to the variations in scale, orientation, pose, facial expressions, partial occlusions and lighting conditions. In the current paper, a scheme includes the method of three-hierarchal stages for facial components extraction is presented; it works regardless of illumination variance. Adaptive linear contrast enhancement methods like gamma correction and contrast stretching are used to simulate the variance in light condition among images. As testing material
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreThis paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on th
... Show MoreThis research paper aimed to quantitively characterize the pore structure of shale reservoirs. Six samples of Silurian shale from the Ahnet basin were selected for nitrogen adsorption-desorption analysis. Experimental findings showed that all the samples are mainly composed of mesopores with slit-like shaped pores, as well as the Barrett-Joyner-Halenda pore volume ranging from 0.014 to 0.046 cm3/ 100 g, where the lowest value has recorded in the AHTT-1 sample, whereas the highest one in AHTT-6, while the rest samples (AHTT-2, AHTT-3, AHTT-4, AHTT-5) have a similar average value of 0.03 cm3/ 100 g. Meanwhile, the surface area and pore size distribution were in the range of 3.8 to 11.1 m2 / g and 1.7 to 40 nm, respectively.
... Show MoreStream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha
... Show MoreThis paper is concerned with introducing and studying the o-space by using out degree system (resp. i-space by using in degree system) which are the core concept in this paper. In addition, the m-lower approximations, the m-upper approximations and ospace and i-space. Furthermore, we introduce near supraopen (near supraclosed) d. g.'s. Finally, the supra-lower approximation, supraupper approximation, supra-accuracy are defined and some of its properties are investigated.