One study whose importance has significantly grown in recent years is lip-reading, particularly with the widespread of using deep learning techniques. Lip reading is essential for speech recognition in noisy environments or for those with hearing impairments. It refers to recognizing spoken sentences using visual information acquired from lip movements. Also, the lip area, especially for males, suffers from several problems, such as the mouth area containing the mustache and beard, which may cover the lip area. This paper proposes an automatic lip-reading system to recognize and classify short English sentences spoken by speakers using deep learning networks. The input video extracts frames and each frame is passed to the Viola-Jones to detect the face area. Then 68 landmarks of the facial area are determined, and the landmarks from 48 to 68 represent the lip area extracted based on building a binary mask. Then, the contrast is enhanced to improve the quality of the lip image by applying contrast adjustment. Finally, sentences are classified using two deep learning models, the first is AlexNet, and the second is VGG-16 Net. The database consists of 39 participants (32 males and 7 females). Each participant repeats the short sentences five times. The outcomes demonstrate the accuracy rate of AlexNet is 90.00%, whereas the accuracy rate for VGG-16 Net is 82.34%. We concluded that AlexNet performs better for classifying short sentences than VGG-16 Net.
In this research, the semiparametric Bayesian method is compared with the classical method to estimate reliability function of three systems : k-out of-n system, series system, and parallel system. Each system consists of three components, the first one represents the composite parametric in which failure times distributed as exponential, whereas the second and the third components are nonparametric ones in which reliability estimations depend on Kernel method using two methods to estimate bandwidth parameter h method and Kaplan-Meier method. To indicate a better method for system reliability function estimation, it has be
... Show MoreThis research is devoted to study the strengthening technique for the existing reinforced concrete beams using external post-tensioning. An analytical methodology is proposed to predict the value of the effective prestress force for the external tendons required to close cracks in existing beams. The external prestressing force required to close cracks in existing members is only a part from the total strengthening force.
A computer program created by Oukaili (1997) and developed by Alhawwassi (2008) to evaluate curvature and deflection for reinforced concrete beams or internally prestressed concrete beams is modified to evaluate the deflection and the stress of the external tendons for the externally strengthened beams using Matlab
Measuring the efficiency of postgraduate and undergraduate programs is one of the essential elements in educational process. In this study, colleges of Baghdad University and data for the academic year (2011-2012) have been chosen to measure the relative efficiencies of postgraduate and undergraduate programs in terms of their inputs and outputs. A relevant method to conduct the analysis of this data is Data Envelopment Analysis (DEA). The effect of academic staff to the number of enrolled and alumni students to the postgraduate and undergraduate programs are the main focus of the study.
The current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes, different traffic rates, different traffic sources, different pause times and different simulation times . A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere
... Show MoreThe Ground Penetrating Radar (GPR) is frequently used in pavement engineering
for road pavement inspection. The main objective of this work is to validate
nondestructive, quick and powerful measurements using GPR for assessment of subgrade
and asphalt /concrete conditions. In the present study, two different antennas
(250, 500 MHz) were used. The case studies are presented was carried in University
of Baghdad over about 100m of paved road. After data acquisition and radar grams
collection, they have been processed using RadExplorer V1.4 software
implementing different filters with the most effective ones (time zero adjustment and
DC removal) in addition to other interpretation tool parameters.
The interpretatio
The public budget is on the same time an art and a science .As an accountable science it seeks balance between public income and public expenditure for an accountable year. And as an accountable art it seeks to achieve economic balance by distributing equitable income in order to reach sustainable development .This is the optimal use of all natural and human resources to address scarcity of natural resources facing the increase need of human resources by spending on education, health, environment, housing, agriculture and industry to achieve social justice for the current generation and future generations. Since the first budget in Iraq on 1921 an accounting budget, is balancing the sections and items has been adopted and since the publi
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreBased on the results of standard penetration tests (SPTs) conducted in Al-Basrah governorate, this research aims to present thematic maps and equations for estimating the bearing capacity of driven piles having several lengths. The work includes drilling 135 boreholes to a depth of 10 m below the existing ground level and three standard penetration tests (SPT) at depths of 1.5, 6, and 9.5 m were conducted in each borehole. MATLAB software and corrected SPT values were used to determine the bearing capacity of driven piles in Al-Basrah. Several-order interpolation polynomials are suggested to estimate the bearing capacity of driven piles, but the first-order polynomial is considered the most straightforward. Furthermore, the root means squar
... Show More