Preferred Language
Articles
/
Thb84osBVTCNdQwCA-O-
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated from the run length matrix within each spin and the final feature vector is then used to populate a deep belief network for classification purpose. The proposed SISR system is evaluated using the English language Speech Database for Speaker Recognition (ELSDSR) database. The experimental results were achieved with 96.46 accuracy; showing that the proposed SISR system outperforms those reported in the related current research work in terms of recognition accuracy.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Oct 29 2019
Journal Name
Journal Of Engineering
Mobile-based Human Emotion Recognition based on Speech and Heart rate
...Show More Authors

Mobile-based human emotion recognition is very challenging subject, most of the approaches suggested and built in this field utilized various contexts that can be derived from the external sensors and the smartphone, but these approaches suffer from different obstacles and challenges. The proposed system integrated human speech signal and heart rate, in one system, to leverage the accuracy of the human emotion recognition. The proposed system is designed to recognize four human emotions; angry, happy, sad and normal. In this system, the smartphone is used to   record user speech and send it to a server. The smartwatch, fixed on user wrist, is used to measure user heart rate while the user is speaking and send it, via Bluetooth,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Computers & Electrical Engineering
A new proposed statistical feature extraction method in speech emotion recognition
...Show More Authors

View Publication
Scopus (42)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Sat Sep 09 2017
Journal Name
International Journal Of Science And Research (ijsr)
Fingerprints Recognition Using the Local Energy Distribution over Haar Wavelet Subbands
...Show More Authors

Fingerprints are commonly utilized as a key technique and for personal recognition and in identification systems for personal security affairs. The most widely used fingerprint systems utilizing the distribution of minutiae points for fingerprint matching and representation. These techniques become unsuccessful when partial fingerprint images are capture, or the finger ridges suffer from lot of cuts or injuries or skin sickness. This paper suggests a fingerprint recognition technique which utilizes the local features for fingerprint representation and matching. The adopted local features have determined using Haar wavelet subbands. The system was tested experimentally using FVC2004 databases, which consists of four datasets, each set holds

... Show More
View Publication
Publication Date
Sat Feb 01 2025
Journal Name
Algorithms
Three-Dimensional Object Recognition Using Orthogonal Polynomials: An Embedded Kernel Approach
...Show More Authors

Computer vision seeks to mimic the human visual system and plays an essential role in artificial intelligence. It is based on different signal reprocessing techniques; therefore, developing efficient techniques becomes essential to achieving fast and reliable processing. Various signal preprocessing operations have been used for computer vision, including smoothing techniques, signal analyzing, resizing, sharpening, and enhancement, to reduce reluctant falsifications, segmentation, and image feature improvement. For example, to reduce the noise in a disturbed signal, smoothing kernels can be effectively used. This is achievedby convolving the distributed signal with smoothing kernels. In addition, orthogonal moments (OMs) are a cruc

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Assessing EFL Learners Ability in the Recognition And Production of Homophones
...Show More Authors

This study deals with the orthographic processing ability of homophones
which can account for variance in word recognition and production skills due to
phonological processing. The study aims at: A)Investigating whether the students
can recognize correct usage and spelling comprehension of different homophones
by using appropriate word that overlapped in both phonology and orthography.
B)Assessing spelling production word association to the written form of the
homophone in the sentence comprehension task. To achieve these aims, two tests
have been conducted and distributed on 50 students at first stage at the College of
Education(Ibn-Rushd) for the academic year 2010-2011. The two tests are exposed
to a jury of

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of College Of Education
Recognition the Arabic Characters Based on the Characteristics of Arabic Language
...Show More Authors

Publication Date
Fri Mar 12 2021
Journal Name
Sensors
A Robust Handwritten Numeral Recognition Using Hybrid Orthogonal Polynomials and Moments
...Show More Authors

Numeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a

... Show More
View Publication
Scopus (37)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Facial Emotion Images Recognition Based On Binarized Genetic Algorithm-Random Forest
...Show More Authors

Most recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Or

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (11)
Scopus Crossref
Publication Date
Tue Mar 01 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Content-Based Cartoon Image Retrieval
...Show More Authors

Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Color Image
...Show More Authors

In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP

View Publication Preview PDF
Crossref (1)
Crossref