Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated from the run length matrix within each spin and the final feature vector is then used to populate a deep belief network for classification purpose. The proposed SISR system is evaluated using the English language Speech Database for Speaker Recognition (ELSDSR) database. The experimental results were achieved with 96.46 accuracy; showing that the proposed SISR system outperforms those reported in the related current research work in terms of recognition accuracy.
Markov chains are an application of stochastic models in operation research, helping the analysis and optimization of processes with random events and transitions. The method that will be deployed to obtain the transient solution to a Markov chain problem is an important part of this process. The present paper introduces a novel Ordinary Differential Equation (ODE) approach to solve the Markov chain problem. The probability distribution of a continuous-time Markov chain with an infinitesimal generator at a given time is considered, which is a resulting solution of the Chapman-Kolmogorov differential equation. This study presents a one-step second-derivative method with better accuracy in solving the first-order Initial Value Problem
... Show MoreA reduced-order extended state observer (RESO) based a continuous sliding mode control (SMC) is proposed in this paper for the tracking problem of high order Brunovsky systems with the existence of external perturbations and system uncertainties. For this purpose, a composite control is constituted by two consecutive steps. First, the reduced-order ESO (RESO) technique is designed to estimate unknown system states and total disturbance without estimating an available state. Second, the continuous SMC law is designed based on the estimations supplied by the RESO estimator in order to govern the nominal system part. More importantly, the robustness performance is well achieved by compensating not only the lumped disturbance, but also its esti
... Show MoreThe corrosion inhibition effect of a new furan derivative (furan-2-ylmethyl sulfanyl acetic acid furan-2-ylmethylenehydrazide) on mild steel in 1.0 M HCl was investigated using corrosion potential (ECORR) and potentiodynamic polarization. The obtained results indicated that the new furan derivative (furan-2-ylmethyl sulfanyl acetic acid furan-2-ylmethylenehydrazide) (FSFD) has a promising inhibitive effects on the corrosion of mild steel in 1.0 M HCl across all of the conditions examined. The density functional theory (DFT) study was performed on the new furan derivative (FSFD) at the B3LYP/6-311G (d, p) basis set level to explore the relation between their inhibition efficiency and molecular electro
Medical images play a crucial role in the classification of various diseases and conditions. One of the imaging modalities is X-rays which provide valuable visual information that helps in the identification and characterization of various medical conditions. Chest radiograph (CXR) images have long been used to examine and monitor numerous lung disorders, such as tuberculosis, pneumonia, atelectasis, and hernia. COVID-19 detection can be accomplished using CXR images as well. COVID-19, a virus that causes infections in the lungs and the airways of the upper respiratory tract, was first discovered in 2019 in Wuhan Province, China, and has since been thought to cause substantial airway damage, badly impacting the lungs of affected persons.
... Show MoreThe disposal of textile effluents to the surface water bodies represents the critical issue especially these effluents can have negative impacts on such bodies due to the presence of dyes in their composition. Biological remediation methods like constructed wetlands are more cost-effective and environmental friendly technique in comparison with traditional methods. The ability of vertical subsurface flow constructed wetlands units for treating of simulated wastewater polluted with Congo red dye has been studied in this work. The units were packed with waterworks sludge bed that either be unplanted or planted with Phragmites australis and Typha domingensis. The efficacy of present units was evaluated by monitoring of DO, Temperature, COD
... Show MoreIn this study used three methods such as Williamson-hall, size-strain Plot, and Halder-Wagner to analysis x-ray diffraction lines to determine the crystallite size and the lattice strain of the nickel oxide nanoparticles and then compare the results of these methods with two other methods. The results were calculated for each of these methods to the crystallite size are (0.42554) nm, (1.04462) nm, and (3.60880) nm, and lattice strain are (0.56603), (1.11978), and (0.64606) respectively were compared with the result of Scherrer method (0.29598) nm,(0.34245),and the Modified Scherrer (0.97497). The difference in calculated results Observed for each of these methods in this study.
In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show More