Preferred Language
Articles
/
bsj-1074
Using Neural Network with Speaker Applications
...Show More Authors

In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty. We also present a method for selecting the speakers used for MLP training which further improves identification performance.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 14 2023
Journal Name
Journal Of Big Data
A survey on deep learning tools dealing with data scarcity: definitions, challenges, solutions, tips, and applications
...Show More Authors
Abstract<p>Data scarcity is a major challenge when training deep learning (DL) models. DL demands a large amount of data to achieve exceptional performance. Unfortunately, many applications have small or inadequate data to train DL frameworks. Usually, manual labeling is needed to provide labeled data, which typically involves human annotators with a vast background of knowledge. This annotation process is costly, time-consuming, and error-prone. Usually, every DL framework is fed by a significant amount of labeled data to automatically learn representations. Ultimately, a larger amount of data would generate a better DL model and its performance is also application dependent. This issue is the main barrier for</p> ... Show More
View Publication Preview PDF
Scopus (257)
Crossref (243)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Windows-Based Special Applications Router
...Show More Authors

The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Use Dynamic Bayesian network to estimate the reliability of Adamia Water Network
...Show More Authors

Abstract\

In this research, estimated the reliability of water system network in Baghdad was done. to assess its performance during a specific period. a fault tree through static and dynamic gates was belt and these gates represent logical relationships between the main events in the network and analyzed using dynamic Bayesian networks . As it has been applied Dynamic Bayesian networks estimate reliability by translating dynamic fault tree to Dynamic Bayesian networks and reliability of the system appreciated. As was the potential for the expense of each phase of the network for each gate . Because there are two parts to the Dynamic Bayesian networks and two part of gate (AND), which includes the three basic units of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
IoT-Smart Agriculture: Comparative Study on Farming Applications and Disease Prediction of Apple Crop using Machine Learning
...Show More Authors

     Recently, the Internet of Things has emerged as an encouraging technology that is scaling up new heights towards the modernization of real word physical objects into smarter devices in several domains. Internet of Things (IoT) based solutions in agriculture drives farming into a smart way through the proliferation of smart devices to enhanced production with minimal human involvement. This paper presents a comprehensive study of the role of IoT in prominent applications of farming, wireless communication protocols, and the role of sensors in precision farming. In this research article, the existing frameworks in IoT-based agriculture systems with relevant technologies are presented. Furthermore, the comparative analysis of the a

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 30 2013
Journal Name
Al-kindy College Medical Journal
Neural Tube Defects in Iraq
...Show More Authors

1.
Embryonic Origin of Neural Tube Defects.
Insaf Jasim Mahmoud
2.
Etiology of Neural Tube Defectss.
Ali Abdul Razzak Obed
3.
Epidemiology of Neural Tube Defects in Iraq.
Mahmood Dhahir Al-Mendalawi
4.
Surgical Management of Neural Tube Defects.
Laith Thamer Al-Ameri
5.
Prevention of Neural Tube Defects in Iraq.
Mahmood Dhahir Al-Mendalawi

View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Proposed Security Models for Node-level and Network-level Aspects of Wireless Sensor Networks Using Machine Learning Techniques
...Show More Authors

     As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Oct 17 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
ESTIMATION OF MUNICIPAL SOLID WASTE GENERATION AND LANDFILL VOLUME GENERATION AND LANDFILL VOLUME USING ARTIFICIAL NEURAL NETWORKS
...Show More Authors

Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Machine Learning Approach for New COVID-19 Cases Using Recurrent Neural Networks and Long-Short Term Memory
...Show More Authors

     This research aims to predict new COVID-19 cases in Bandung, Indonesia. The system implemented two types of deep learning methods to predict this. They were the recurrent neural networks (RNN) and long-short-term memory (LSTM) algorithms. The data used in this study were the numbers of confirmed COVID-19 cases in Bandung from March 2020 to December 2020. Pre-processing of the data was carried out, namely data splitting and scaling, to get optimal results. During model training, the hyperparameter tuning stage was carried out on the sequence length and the number of layers. The results showed that RNN gave a better performance. The test used the RMSE, MAE, and R2 evaluation methods, with the best numbers being  0.66975075, 0.470

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Global Trends In Pharmaceutical Sciences
A REVIEW: CEFPODOXIME PROXETIL (DOXEF. PROXETIL) DISCOVERY, PREPARATION, APPLICATIONS AND COMPARISON WITH CEFPODOXIME- CLAVULANIC ACID IN ACTIVITY
...Show More Authors

Publication Date
Wed Sep 08 2021
Journal Name
Egyptian Journal Of Chemistry
Synthesis And Characterization Of Metal(II) Complexes With Azo Dye Ligand And Their Industrial And Biological Applications
...Show More Authors

Azo ligand 4-((2-hydroxy-3,5-dimethylphenyl)diazenyl) benzoic acid was synthesized from 4-aminobenzoic acid and 2,4- dimethylphenol. Azo dye compounds have been characterized by different techniques (1H-NMR, UV-Vis and FT-IR). Metal chelates of (ZnII, CdII and HgII) have been synthesized with azo ligand (L). Produced compounds have been identified by using spectral studies, elemental analysis(C.H.N.) and conductivity. Produced metal chelates were studied using mole ratio as well sequences contrast types. Rate of concentration(1×10-4-3×10-4 Mole/L) sequence Beer's law. Compound solutions have been noticed height molar absorptivity. The addendum of ligand and compounds has applied as disperse dyes on cotton fabrics for antibacterial activit

... Show More
Preview PDF