Preferred Language
Articles
/
TRbo_4kBVTCNdQwCI4_T
An automatic lip reading for short sentences using deep learning nets
...Show More Authors

One study whose importance has significantly grown in recent years is lip-reading, particularly with the widespread of using deep learning techniques. Lip reading is essential for speech recognition in noisy environments or for those with hearing impairments. It refers to recognizing spoken sentences using visual information acquired from lip movements. Also, the lip area, especially for males, suffers from several problems, such as the mouth area containing the mustache and beard, which may cover the lip area. This paper proposes an automatic lip-reading system to recognize and classify short English sentences spoken by speakers using deep learning networks. The input video extracts frames and each frame is passed to the Viola-Jones to detect the face area. Then 68 landmarks of the facial area are determined, and the landmarks from 48 to 68 represent the lip area extracted based on building a binary mask. Then, the contrast is enhanced to improve the quality of the lip image by applying contrast adjustment. Finally, sentences are classified using two deep learning models, the first is AlexNet, and the second is VGG-16 Net. The database consists of 39 participants (32 males and 7 females). Each participant repeats the short sentences five times. The outcomes demonstrate the accuracy rate of AlexNet is 90.00%, whereas the accuracy rate for VGG-16 Net is 82.34%. We concluded that AlexNet performs better for classifying short sentences than VGG-16 Net.

Scopus Crossref
View Publication
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (11)
Scopus Crossref
Publication Date
Thu Sep 16 2021
Journal Name
International Journal Of Clinical Practice
An overview of post‐COVID‐19 complications
...Show More Authors

View Publication
Scopus (5)
Crossref (7)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Diabetes & Metabolic Syndrome: Clinical Research & Reviews
Rhabdomyolysis; is it an overlooked DKA complication
...Show More Authors

View Publication
Scopus (4)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
Irony in conceptual art (An analytical study )
...Show More Authors

In the 20th century, the concept of "sarcasm" has relatively prevailed, and in this sense, it is a method in the art of conversation that wants to keep the question about the intended meaning, that is, "saying something and suggesting its opposite."
There are other concepts that indicate that sarcasm is saying something in a way that provokes the recipient of the statement an infinite number of different interpretations, with multiple readers of different interpretations. While the philosophy of irony stands by the standards of things, exaggeration or minimization, this manipulation takes place within the enjoyment. However, it's a method to present sharp criticism in an atmosphere of criticism that differs from generation to gener

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Craniomaxillofacial Trauma & Reconstruction
Mandibular Fractures in Iraq: An Epidemiological Study
...Show More Authors

The purpose of this study was to evaluate the epidemiological characteristics of the mandibular fractures relating to gender, age, the etiology of injury, and the rendered treatment modalities and complications. The data of the patients who sustained mandibular fractures were retrieved and were analyzed retrospectively, and based on these data a descriptive analysis was conducted. A total of 112 patients were included in this study; the most common cause was road traffic accidents (RTAs) followed by assaults and missile injuries. The most frequently involved age group was 11 to 20 years, treatment modalities included conservative, closed reduction and indirect fixation, and open reduction and internal fixation (ORIF) in 11.6, 79.5, and 8.9%

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Tue Dec 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Electrofacies Characterization of an Iraqi Carbonate Reservoir
...Show More Authors

 

Predicting peterophysical parameters and doing accurate geological modeling which are an active research area in petroleum industry cannot be done accurately unless the reservoir formations are classified into sub-groups. Also, getting core samples from all wells and characterize them by geologists are very expensive way; therefore, we used the Electro-Facies characterization which is a simple and cost-effective approach to classify one of Iraqi heterogeneous carbonate reservoirs using commonly available well logs.

The main goal of this work is to identify the optimum E-Facies units based on principal components analysis (PCA) and model based cluster analysis(MC

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
CVOTING: An Anonymous Ballot E-Voting System
...Show More Authors

One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Sep 14 2021
Journal Name
Nature Reviews Microbiology
Towards an integrative view of virus phenotypes
...Show More Authors

View Publication
Scopus (28)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Role of statement of cash flow in forecasting in the global financial crisis 2008: An analytical study for The American Company (Freddie Mac)
...Show More Authors

On of the direct causes which led to the global financial crisis 2008 is decrease or collapse in liquidity of large financial institutions which is reflected on investments of a considerable number of institutions and persons.

This study aim's through out its three sections to explain the disclosure level of financial institutions which affected by Financial Crisis from liquidity information which explained in the statement of cash flow according to Timeliness and Completeness.

The study concluded an important result the company of research sample was disclosure in Timeliness and Completeness from all of accounting information is related in liquidity or that related in result of operations and financial position. The more

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the structure of salaries of public sector workers for strategic planning purposes An analytical study in the general body of groundwater
...Show More Authors

The research discusses the problem of salaries in the public sector in terms of the process of analyzing its structure and the possibility of benefiting from the information provided by the analysis process for the strategic planning process, and the General Authority for Groundwater has been adopted and one of the formations of the Ministry of Water Resources, which is centrally funded, to represent the salary structure of its employees (1117) employees be a field of research, as the salary structure in it was analyzed for the period between (2014-2019) using the quantitative approach to analysis and by relying on a number of statistical tools in the analysis process, including mathematical circles, upper limits, lower limits, p

... Show More
View Publication Preview PDF
Crossref