Preferred Language
Articles
/
Oxbt4osBVTCNdQwCpOO1
Automatic voice activity detection using fuzzy-neuro classifier
...Show More Authors

Voice Activity Detection (VAD) is considered as an important pre-processing step in speech processing systems such as speech enhancement, speech recognition, gender and age identification. VAD helps in reducing the time required to process speech data and to improve final system accuracy by focusing the work on the voiced part of the speech. An automatic technique for VAD using Fuzzy-Neuro technique (FN-AVAD) is presented in this paper. The aim of this work is to alleviate the problem of choosing the best threshold value in traditional VAD methods and achieves automaticity by combining fuzzy clustering and machine learning techniques. Four features are extracted from each speech segment, which are short term energy, zero-crossing rate, autocorrelation, and log energy. A modified version of fuzzy C-Means is then used to cluster speech segments into three clusters; two clusters for voice and one for unvoiced. After that, three feed forward neural networks are trained to adjust their weights, in which each network represents one cluster. To make the final decision regarding the class type of a given speech segment, the membership degrees of this segment in all clusters along with neural networks' decisions are given to a defuzzification step which finally gives the class type of that segment. The proposed FN-AVAD is tested on the public multimodal emotion database, Surrey AudioVisual Expressed Emotion (SAVEE), and the error rate was 2.08%. The achieved results are comparable to the results achieved by the current published works in the literature.

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The accountancy Using of Gaols programming model to determine the optimal production mix
...Show More Authors

The research aims to determine the mix of production optimization in the case of several conflicting objectives to be achieved at the same time, therefore, discussions dealt with the concept of programming goals and entrances to be resolved and dealt with the general formula for the programming model the goals and finally determine the mix of production optimization using a programming model targets to the default case.

View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Engineering Science And Technology
Air entrained vortex occurrence at sump for inclined multiple intake pipes using cfd
...Show More Authors

Scopus (1)
Scopus
Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Removal of Lead (II) from Aqueous Solution Using Chitosan Impregnated Granular Activated Carbon
...Show More Authors

The use of biopolymer material Chitosan impregnated granular activated carbon CHGAC as adsorbent in the removal of lead ions  pb.2+   from aqueous solution was studied using batch adsorption mode. The prepared CHGAC was characterized by Scanning Electronic Microscopy (SEM) and atomic-absorption  pectrophotometer. The adsorption of lead ions onto Chitosan-impregnated granular activated carbon was examined as a function of adsorbent weight, pH and
contact time in Batch system. Langmuir and Freundlich models were employed to analyze the resulting experimental data demonstrated that better fitted by Langmuir isotherm model than Freundlich model, with good correlation coefficient. The maximum adsorption capacity calculated f

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Waste Water Treatment by Liquid-Solid Adsorption Using Calcined Sand-Clay Mixture Adsorbent
...Show More Authors

Effluent from incompetent wastewater treatment plants (WWTPs) contains a great variety of pollutants so support water treatments are essential. The present work studies the removal of phosphate species from aqueous solutions by adsorption on to spherical Calcined Sand -Clay mixture (CSCM) used a natural, local and low-cost adsorbent. Batch experiments were performed to estimate removal efficiency of phosphate. The adsorption experiments were carried out as function of pH, dose of adsorbent, initial concentration, temperature and time of adsorption. The efficient removal was accomplished for pH between 10 and 12. The experimental results also showed that the removal of phosphate by (CSCM) was rapid (the % removal 98.9%, 92%, 90%, 89% in 6

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Solution of Riccati matrix differential equation using new approach of variational ‎iteration method
...Show More Authors

To obtain the approximate solution to Riccati matrix differential equations, a new variational iteration approach was ‎proposed, which is suggested to improve the accuracy and increase the convergence rate of the approximate solutons to the ‎exact solution. This technique was found to give very accurate results in a few number of iterations. In this paper, the ‎modified approaches were derived to give modified solutions of proposed and used and the convergence analysis to the exact ‎solution of the derived sequence of approximate solutions is also stated and proved. Two examples were also solved, which ‎shows the reliability and applicability of the proposed approach. ‎

Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of American Science
Morphohistological study of the tongue in local mice species by using special stain
...Show More Authors

Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Aip Conference Proceedings
Comparative analysis of parameter estimation methods for Meixner process using wavelet packet transform
...Show More Authors

The current research creates an overall relative analysis concerning the estimation of Meixner process parameters via the wavelet packet transform. Of noteworthy presentation relevance, it compares the moment method and the wavelet packet estimator for the four parameters of the Meixner process. In this paper, the research focuses on finding the best threshold value using the square root log and modified square root log methods with the wavelet packets in the presence of noise to enhance the efficiency and effectiveness of the denoising process for the financial asset market signal. In this regard, a simulation study compares the performance of moment estimation and wavelet packets for different sample sizes. The results show that wavelet p

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Apr 05 2023
Journal Name
Journal Of Engineering
Performance Evaluation of Small Scale Air-Conditioning System Using R22 and Alternative Refrigerants
...Show More Authors

A mathematical model has been formulated to predict the influence of high outdoor air temperature on the performance of small scale air - conditioning system using R22 and alternative refrigerants R290, R407C, R410A. All refrigerants were investigated in the cooling mode operation. The mathematical model results have been validated with experimental data extracted from split type air conditioner of 2 TR capacity. This entailed the construction of an experimental test rig which consists of four main parts. They are, the refrigeration system, psychrometric test facility, measuring instrumentation, and auxiliary systems. The conditioned air was maintained at 25 0C dry bulb and 19 0C wet bulb for all tests. The outdoor ambient air temperatur

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Advances In Science, Technology And Engineering Systems Journal
Bayes Classification and Entropy Discretization of Large Datasets using Multi-Resolution Data Aggregation
...Show More Authors

Big data analysis has important applications in many areas such as sensor networks and connected healthcare. High volume and velocity of big data bring many challenges to data analysis. One possible solution is to summarize the data and provides a manageable data structure to hold a scalable summarization of data for efficient and effective analysis. This research extends our previous work on developing an effective technique to create, organize, access, and maintain summarization of big data and develops algorithms for Bayes classification and entropy discretization of large data sets using the multi-resolution data summarization structure. Bayes classification and data discretization play essential roles in many learning algorithms such a

... Show More
View Publication
Scopus Crossref