Preferred Language
Articles
/
bsj-3715
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pitch, tone, and frequency. The speaker's models are created and saved in the system environment and used to verify the identity required by people accessing the systems, which allows access to various services that are controlled by voice, speaker identification involves two main parts: the first part is the feature extraction and the second part is the feature matching.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Removal of Dyes from Wastewater of Textile Industries Using Activated Carbon and Activated Alumina
...Show More Authors

This work was carried to study the capability of activated alumina from bauxite compared with activated carbon adsorption capability to reduce the color content from Al-Hilla Textile Company wastewater. Six dyes were studied from two types(reactive and dispersed) namely (blue, red, yellow) from wastewater and aqueous solutions.
Forty eight experiments were carried out to study the effect of various initial conditions (bed height, flow rate, initial concentration, pH value, temperature, and competitive adsorption) on adsorption process.
The results showed that the adsorption process using activated carbon insured a good degree of color reduction reaching (99.7%) and was better than activated bauxite which reached (95%).

View Publication Preview PDF
Publication Date
Tue Apr 19 2022
Journal Name
Chemical Methodologies
Biosynthesis, Characterization, and Applications of Bismuth Oxide Nanoparticles Using Aqueous Extract of Beta Vulgaris
...Show More Authors

Bismuth oxide nanoparticle Bi2O3NPs has a wide range of applications and less adverse effects than conventional radio sensitizers. In this work, Bi2O3NPs (D1, D2) were successfully synthesized by using the biosynthesis method with varying bismuth salts, bismuth sulfate Bi2(SO4)3 (D1) or bismuth nitrate. Penta hydrate Bi(NO3)3.5H2O (D2) with NaOH with beta-vulgaris extract. The Bi2O3NPs properties were characterized by different spectroscopic methods to determine Bi2O3NPs structure, nature of bonds, size of nanoparticle, element phase, presence, crystallinity and morphology. The existence of the Bi2O3 band was verified by the FT-IR. The Bi2O3 NPs revealed an absorption peak in the UV-visible spectrum, with energy gap Eg = 3.80eV. The X-ray p

... Show More
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Kinetic and Theoretical Study of Removal Gentian Violet from Aqueous Solution Using Stachy Plant
...Show More Authors

     The main parameters and methods influencing the removal of Gentian Violet (GV) dye from aqueous media were investigated using a stachy plant in this study. The surface of the stachy plant was determined using FTIR spectra. Adsorption is influenced by the adsorbent's characteristic groups. The research took into account the usual conditions for GV dye adsorption by the stachy plant, such as the impact of contact time. Mass dosage , after 0.3 g the amount of adsorbed dye declines. Study pH and ionic strength, the results obtained showed that at pH 3 the largest adsorption of (GV) was seen, while at pH 9, the lowest adsorption was observed  at 298 K, the adsorption kinetics and equilibrium constants were achieved, and the equilibr

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Aug 02 2024
Journal Name
Quantum Studies: Mathematics And Foundations
Implementation of a modified noise-free and noisy multistage quantum cryptography protocol using QISKIT
...Show More Authors

Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Dec 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Synthesis and Characterization of Nano Y Zeolite Using MWCNT as Media for Crystal Growth
...Show More Authors

   The present research was conducted to synthesis Y-Zeolite by sol-gel technique using MWCNT (multiwalled carbon nanotubes) as crystallization medium to get a narrow range of particle size distribution with small average size compared with ordinary methods. The phase pattern, chemical structure, particle size, and surface area were detected by XRD, FTIR, BET and AFM, respectively. Results shown that the average size of Zeolite with and without using MWCNT were (92.39) nm and (55.17) nm respectively .Particle size range reduced from (150-55) nm to (130-30) nm. The surface area enhanced to be (558) m2/g with slightly large pore volume (0.231) km3/g was obtained. Meanwhile, degree of crystallization decrease

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 31 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Study the Effect of Using Microwave Radiation and H-Donors on Improving Heavy Oil
...Show More Authors

The present research has investigated the effect of microwave energy on improving the flow properties of heavy crude oil. The fragmentation of crude oil molecules was carried out with and without using 1 and 10 wt. % concentration of various types of H-donors like tetralin, cyclohexane, and naphtha.  Microwave power of 320, 385, and 540 W and radiation time 1-9 min, and temperature were studied. The kinematic viscosity and asphaltene content were measured for evaluation the improving of heavy crude oil.

   Results show that viscosity of crude oil decreased with increase H-donor concentration, a maximum percentage of viscosity reduction was10.63 % for tetralin at 6 min radiation time, while 8.67%, and 7.34% for cycl

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Physics: Conference Series
Study electron transport coefficients for Ar, O2 and their mixtures by using EEDF program
...Show More Authors

Publication Date
Wed Dec 09 2020
Journal Name
Banks And Bank Systems
Cooperative decision-making on fiscal and monetary policy in Iraq using the prisoner’s dilemma
...Show More Authors

This paper investigates the interaction between fiscal and monetary policy in Iraq after 2003 using the prisoner’s dilemma.The paper aims to determine the best form of coordination between these policies to achieve their goals; payoff matrix for both policies was constructed. To achieve the purpose, the quantitative approach was applied using several methods, including regression, building payoff matrices and decision analysis using a number of software.The results of the monetary policy payment function show that inflation rate has an inverse relationship with the auctions of selling foreign currency and a positive relationship with the government’s activity, while the fiscal policy function shows that real growth is positively

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of mandibular third molar position by using computed tomography and reconstructed lateral radiograph
...Show More Authors

Background: Consideration of mandibular third molar is important from orthodontic perspective due to several factors such as, lower anterior arch crowding, relapse in lower anterior region, interference with uprighting of mandibular first and second molars during anchorage preparation and molar distalization. The aims of this study were to assess of gender differences in the mandibular third molar position and compare and evaluate whether there is any differences in the results provided by CT scan and lateral reconstructed radiograph. Materials and Methods: The sample of present study consisted of 39 patients (18 males and 21 females) with age range 11-15 years. CT images for patients who were attending at Al Suwayra General Hospital/the C

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Scopus Crossref