Preferred Language
Articles
/
Oxbt4osBVTCNdQwCpOO1
Automatic voice activity detection using fuzzy-neuro classifier
...Show More Authors

Voice Activity Detection (VAD) is considered as an important pre-processing step in speech processing systems such as speech enhancement, speech recognition, gender and age identification. VAD helps in reducing the time required to process speech data and to improve final system accuracy by focusing the work on the voiced part of the speech. An automatic technique for VAD using Fuzzy-Neuro technique (FN-AVAD) is presented in this paper. The aim of this work is to alleviate the problem of choosing the best threshold value in traditional VAD methods and achieves automaticity by combining fuzzy clustering and machine learning techniques. Four features are extracted from each speech segment, which are short term energy, zero-crossing rate, autocorrelation, and log energy. A modified version of fuzzy C-Means is then used to cluster speech segments into three clusters; two clusters for voice and one for unvoiced. After that, three feed forward neural networks are trained to adjust their weights, in which each network represents one cluster. To make the final decision regarding the class type of a given speech segment, the membership degrees of this segment in all clusters along with neural networks' decisions are given to a defuzzification step which finally gives the class type of that segment. The proposed FN-AVAD is tested on the public multimodal emotion database, Surrey AudioVisual Expressed Emotion (SAVEE), and the error rate was 2.08%. The achieved results are comparable to the results achieved by the current published works in the literature.

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Using Remote Sensing and Geographic Information Systems to Study the Change Detection in Temperature and Surface Area of Hamrin Lake
...Show More Authors

This study was conducted on Lake Hamrin situated in Diyala governorate, focal Iraq, between latitudes 44º 53ʹ 26.16 '- 45º 07 ʹ 28.03ʺ and 34º 04ʹ 24.75ʺ ــ 34º 19ʹ 12.74ʺ . As in this study, the surface area of Hamrin Lake was calculated from satellite images during the period from October 2019 to September 2020, with an average satellite image for each month, furthermore,by utilizing the Normalized Differences Water Index (NDWI), the largest surface area was 264,617 km2 for October and the lowest surface area 140.202 km2 for September. The surface temperature of the lake water was also calculated from satellite images of the Landsat 8 satellite, based on ban

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Digest Journal Of Nanomaterials And Biostructures
Nanostructured silicon trapping for single Escherichia coli bacteria detection
...Show More Authors

The detection for Single Escherichia Coli Bacteria has attracted great interest and in biology and physics applications. A nanostructured porous silicon (PS) is designed for rapid capture and detection of Escherichia coli bacteria inside the micropore. PS has attracted more attention due to its unique properties. Several works are concerning the properties of nanostructured porous silicon. In this study PS is fabricated by an electrochemical anodization process. The surface morphology of PS films has been studied by scanning electron microscope (SEM) and atomic force microscope (AFM). The structure of porous silicon was studied by energy-dispersive X-ray spectroscopy (EDX). Details of experimental methods and results are given and discussed

... Show More
Scopus
Publication Date
Sun Dec 03 2023
Journal Name
2023 Ieee International Conference On Energy Technologies For Future Grids (etfg)
Optimal Hybrid Type-2 Fuzzy-PID Controller for Blade Pitch Angle in Horizontal-axis Wind Turbines
...Show More Authors

In the modern world, wind turbine (WT) has become the largest source of renewable energy. The horizontal-axis wind turbine (HAWT) has higher efficiency than the vertical-axis wind turbine (VAWT). The blade pitch angle (BPA) of WT is controlled to increase output power generation over the rated wind speed. This paper proposes an accurate controller for BPA in a 500-kw HAWT. Three types of controllers have been applied and compared to find the best controller: PID controller (PIDC), fuzzy logic type-2 controller (T2FLC), and hybrid type-2 fuzzy-PID controller (T2FPIDC). This paper has been used Mamdani and Sugeno fuzzy inference systems (FIS) to find the best inference system for WT controllers. Furthermore, genetic algorithm (GA) and particl

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Mon Sep 01 2025
Journal Name
International Journal Of Renewable Energy Research
A Comparative Study of Optimal Fuzzy Logic Controllers for Blade Pitch Angle in Horizontal-axis Wind Turbines
...Show More Authors

The blade pitch angle (BPA) in wind turbine (WT) is controlled to maximize output power generation above the rated wind speed (WS). In this paper, four types of controllers are suggested and compared for BPA controller in WT: PID controller (PIDC), type-1 fuzzy logic controller (T1-FLC), type-2 fuzzy logic controller (T2-FLC), and hybrid fuzzy-PID controller (FPIDC). The Mamdani and Sugeno fuzzy inference systems (FIS) have been compared to find the best inference system used in FLC. Genetic algorithm (GA) and Particle swarm optimization algorithm (PSO) are used to find the optimal tuning of the PID parameter. The results of500-kw horizontal-axis wind turbine show that PIDC based on PSO can reduced 2.81% in summation error of power

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Shared Congestion Detection: A Comparative Study
...Show More Authors

Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
Biochemical & Cellular Archives
SYNTHESIS, CHARACTERIZATION, ANTIOXIDANT, ANTICANCER HUMAN STUDIES AND BIOLOGICAL ACTIVITY OF MIXED LIGAND COMPLEXES USING SCHIFF BASE LIGAND AND HISTIDINE.
...Show More Authors

الوصف Mixed ligand complexes of Cu (II), Co (II) and Zn (II) with 2-((4-(1-(4-chlorophenylimino) ethyl) phenylimino) methyl) phenol (L) and histidine (His) have been prepared and diagnosed by ¹H and13 C NMR, FT-IR and electronic spectral data, thermal gravimetric, molar conductance and metal analysis measurements. The ligand (L) shows a bidentate nature and the coordination occurs through N and O atoms of imine group and phenol group respectively whereas (His) behave as tridentate ligand, coordinating through the-NH2 group and carboxylate oxygen group and N atoms of imidazole ring. The analytical studies for three complexes have shown octahedral structure. The anticancer activity was screened against human cancer cell such Follicular

... Show More
Publication Date
Sat Feb 18 2023
Journal Name
Luminescence
Online column preconcentration for speciation and selective determination of Cr(III) in natural water samples using flow injection with chemiluminescence detection
...Show More Authors
Abstract<p>A simple, rapid, sensitive and inexpensive approach is described in this work based on a combination of solid‐phase extraction of 8‐hydroxyquinoline (8HQ), for speciation and preconcentration of Cr(III) and Cr(VI) in river water, and the direct determination of these species using a flow injection system with chemiluminescence detection (FI–CL) and a 4‐diethylamino phenyl hydrazine (DEAPH)–hydrogen peroxide system. At different pH, the two forms of chromium [Cr(III) and Cr(VI)] have different exchange capacities for 8HQ, therefore two columns were constructed; the pH of column 1 was adjusted to pH 3 for retaining Cr(III) and column 2 was adjusted to pH 1 for retaining of Cr(VI). The sorbe</p> ... Show More
View Publication
Scopus (4)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparison between Process Control Charts and Fuzzy Multinomial Control Charts with Practical Appliance
...Show More Authors

     The control charts are one of the scientific technical statistics tools that will be used to control of production and always contained from three lines  central line and upper, lower lines to control quality of production and represents set of numbers so finally the operating productivity under control or nor than depending on the actual observations. Some times to calculating the control charts are not accurate and not confirming, therefore the Fuzzy Control Charts are using instead of Process Control Charts so this method is more sensitive, accurate and economically for assisting decision maker to control the operation system as early time. In this project will be used set data fr

... Show More
View Publication Preview PDF
Crossref