Monaural source separation is a challenging issue due to the fact that there is only a single channel available; however, there is an unlimited range of possible solutions. In this paper, a monaural source separation model based hybrid deep learning model, which consists of convolution neural network (CNN), dense neural network (DNN) and recurrent neural network (RNN), will be presented. A trial and error method will be used to optimize the number of layers in the proposed model. Moreover, the effects of the learning rate, optimization algorithms, and the number of epochs on the separation performance will be explored. Our model was evaluated using the MIR-1K dataset for singing voice separation. Moreover, the proposed approach achieves (4.81) dB GNSDR gain, (7.28) dB GSIR gain, and (3.39) dB GSAR gain in comparison to current approaches
In this paper an estimator of reliability function for the pareto dist. Of the first kind has been derived and then a simulation approach by Monte-Calro method was made to compare the Bayers estimator of reliability function and the maximum likelihood estimator for this function. It has been found that the Bayes. estimator was better than maximum likelihood estimator for all sample sizes using Integral mean square error(IMSE).
Congenital anomalies commonly occur in humans, possibly visible. If these anomalies appear in visible parts in human body such as face, hands and feet. They may only appear after utilizing a number of special tests in order to show by means of the anomalies that occur in the internal organs of the body such as heart, stomach and kidneys.
Research data have comprised accessible information in the anomalies birth statistics form situated of Health and Life Statistics section at the Ministry of Health and environment, where the number of anomalies births involved in the study (2603 anomalies birth) in Iraq, except Kurdistan region, at 2015. A two way-response logistic regression analysis h
... Show MoreThis paper compares between the direct and indirect georeferencing techniques in Photogrammetry bases on a simulation model. A flight plan is designed which consists of three strips with nine overlapped images for each strip by a (Canon 500D) digital camera with a resolution of 15 Mega Pixels.
The triangulation computations are carried out by using (ERDAS LPS) software, and the direct measurements are taken directly on the simulated model to substitute using GPS/INS in real case. Two computational tests have been implemented to evaluate the positional accuracy for the whole model and the Root Mean Square Error (RMSE) relating to (30) check points show that th
... Show MoreAn integrated GIS-VBA (Geographical Information System – Visual Basic for Application), model is developed for selecting an optimum water harvesting dam location among an available locations in a watershed. The proposed model allows quick and precise estimation of an adopted weighted objective function for each selected location. In addition to that for each location, a different dam height is used as a nominee for optimum selection. The VBA model includes an optimization model with a weighted objective function that includes beneficiary items (positive) , such as the available storage , the dam height allowed by the site as an indicator for the potential of hydroelectric power generation , the rainfall rate as a source of water . In a
... Show MoreShell model and Hartree-Fock calculations have been adopted to study the elastic and inelastic electron scattering form factors for 25Mg nucleus. The wave functions for this nucleus have been utilized from the shell model using USDA two-body effective interaction for this nucleus with the sd shell model space. On the other hand, the SkXcsb Skyrme parameterization has been used within the Hartree-Fock method to get the single-particle potential which is used to calculate the single-particle matrix elements. The calculated form factors have been compared with available experimental data.
B Saleem, H Alwan, L Khalid, Journal of Engineering, 2011 - Cited by 2
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show More