Hand Gesture Recognition With Acoustic Myography and Wavelet Scattering Transform
...Show More Authors
The dependable and efficient identification of Qin seal script characters is pivotal in the discovery, preservation, and inheritance of the distinctive cultural values embodied by these artifacts. This paper uses image histograms of oriented gradients (HOG) features and an SVM model to discuss a character recognition model for identifying partial and blurred Qin seal script characters. The model achieves accurate recognition on a small, imbalanced dataset. Firstly, a dataset of Qin seal script image samples is established, and Gaussian filtering is employed to remove image noise. Subsequently, the gamma transformation algorithm adjusts the image brightness and enhances the contrast between font structures and image backgrounds. After a s
... Show MoreRecently, environmental noise has arisen from various sources, such as those from exhaust mufflers of combustion engines found in cars, trucks, or power generators, which produce significant noise during their operation. Controlling the radiated noise from these mufflers is a major factor in improving acoustic comfort and minimizing the impact on the surrounding communities. Numerous research has been presented for this reason by modification of the internal structure of the exhaust muffler. The main objective of this work is to reduce the noise level emitted from exhaust mufflers. This can be achieved by adjusting structure parameters to attenuate the surrounding environment's radiated noise. Analysis of pressure-wave propagation h
... Show MoreThere is a great deal of systems dealing with image processing that are being used and developed on a daily basis. Those systems need the deployment of some basic operations such as detecting the Regions of Interest and matching those regions, in addition to the description of their properties. Those operations play a significant role in decision making which is necessary for the next operations depending on the assigned task. In order to accomplish those tasks, various algorithms have been introduced throughout years. One of the most popular algorithms is the Scale Invariant Feature Transform (SIFT). The efficiency of this algorithm is its performance in the process of detection and property description, and that is due to the fact that
... Show MoreThis study aims to document and describe the speech sounds and sound inventory that are present in Sorani which is dialect of Kurdish and compare the results with their English counterparts. The research concentrates on the voicing system and the quality of Sorani sounds which are measured by using the voice onset time (VOT) of the stop consonants, and the first three formants of the vowel sounds; the closure duration of voiceless stop consonants in medial position is measured as well.
Ten native speakers of the Sorani dialect (5 males and 5 females) participated in this experiment. All speakers are between 20 and 50 years of age, were born in Sulaimanyiah, migrated to the US, and remain in the US at the time of recording.
... Show MoreA random laser is a non-conventional laser whose feedback mechanism is based on dissorder-induced light. However, random lasers occur in gain media with numerous scatterers and produce coherent laser emission without any predesigned cavity. The generation of coherent emission from multiple scattering is quite general and its basic principles are shown here using sulforhodamine B-TiO suspensions system. These suspensions were pumped with 337.1 nm pulses from N2 laser and the spectral and temporal behavior of light emitted from the pumped surface was recorded. When we pump power above a certain threshold a dramatic narrowing of the emission line width and a shortening of the emitted pulses were observed. We have experimentally found that i
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show More