The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pitch, tone, and frequency. The speaker's models are created and saved in the system environment and used to verify the identity required by people accessing the systems, which allows access to various services that are controlled by voice, speaker identification involves two main parts: the first part is the feature extraction and the second part is the feature matching.
Abstract : This research is concerned with studying the best type and method of irrigation as well as the best cultivated area to reduce the cost of producing dunums of wheat crop in Iraq , and was based on data taken from the Ministry of Planning / Central Statistical Organization About cost of wheat crop production for (12) Iraqi governorates except Kurdistan, Nineveh, Salah al-Din, Anbar) and the sample size (554) according to the cost survey carried out by the Ministry of Planning / Central Statistical Organization for 2017, The results of the research showed that there are significant statistical differences between production costs when using t
... Show MoreThe proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location AP
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreThe effected of the long transmission line (TL) between the actuator and the hydraulic control valve sometimes essentials. The study is concerned with modeling the TL which carries the oil from the electro-hydraulic servovalve to the actuator. The pressure value inside the TL has been controlled by the electro-hydraulic servovalve as a voltage supplied to the servovalve amplifier. The flow rate through the TL has been simulated by using the lumped π element electrical analogy method for laminar flow. The control voltage supplied to servovalve can be achieved by the direct using of the voltage function generator or indirect C++ program connected to the DAP-view program built in the DAP-card data acqu
... Show MoreAn immunological technique was investigated for the detection of human semen in forensic analysis.This technique included a preparation of anti-human seminal plasma antibodies, by immunizing rabbits with treated human semen. The human semen was treated with an acid to prevent cross reactivity with other human body fluids. The antibody produced was tested against different animal,s seminal fluid samples (dog, goat ,sheep, cow) and human body fluids( saliva, blood , vaginal fluid, ear wax and human semen). It was found that using this developed technique was only selectively responsed with human semen . The prepered kit was evaluated and tested in Forensic laboratory- Ministry of Health. Finally, results were obtained in a c
... Show MoreOne hundred and twenty eight currency notes samples 250, 500, and 1000 Iraqi Dinars (ID) values were collected from students, markets, banks, and hospitals in Erbil city , Iraq. The results showed that all collected samples were contaminated with one or more bacteria and fungi species representing 100% contamination and none from the new (control) notes. Seventeen bacterial species and twelve fungal species were isolated, which include Staphylococcus aureus (83.3%), Streptococcus pyogenes (83.3%), Pseudomonas species (83.3%), Aspergillus niger (83.3%), Klebsiella species (75%), Staphylococcus epidermidis (66.6%), and Escherichia coli (66.6%) being the most prevalent. The lower values of currency notes (250 ID and 500 I
... Show MoreBackground: Obesity is a worldwide challenge and is closely
connected to many metabolic diseases. Two types of
adipose tissue, white adipose tissue (WAT) and brown
adipose tissue (BAT) have been identified. White fat cells
store chemical energy, brown adipocytes defend against
hypothermia, obesity and diabetes.
Objective: To localize and quantify brown adipocytes in
human subcutaneous (S) and visceral (V) adipose tissue by
histology and immunohistochemistry.
Type of the study: A cross –sectional study.
Methods: Adipose tissue was obtained from histopathology
specimens taken from ten patients, of different age, sex and
body mass index (BMI), undergoing surgery for different
pathologies
The development of Web 2.0 has improved people's ability to share their opinions. These opinions serve as an important piece of knowledge for other reviewers. To figure out what the opinions is all about, an automatic system of analysis is needed. Aspect-based sentiment analysis is the most important research topic conducted to extract reviewers-opinions about certain attribute, for instance opinion-target (aspect). In aspect-based tasks, the identification of the implicit aspect such as aspects implicitly implied in a review, is the most challenging task to accomplish. However, this paper strives to identify the implicit aspects based on hierarchical algorithm incorporated with common-sense knowledge by means of dimensionality reduction.
The hydrolysis of urea by the enzyme urease is significant for increasing the irroles in human pathogenicity, biocementation, soil fertilizer, and subsequently in soil improvement. This study devoted to the isolation of urease from urea-rich soil samples collected from seven different locations. Isolation of the various bacterial species was conducted using nutrient agar. The identity of isolated urease was based on morphological characteristics and standard microbiological and biochemical procedures. The urease producing strains of bacteria were obtained using the urease hydrolysis test. The bacterial isolates produced from soil samples collected from different environments and treat