The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pitch, tone, and frequency. The speaker's models are created and saved in the system environment and used to verify the identity required by people accessing the systems, which allows access to various services that are controlled by voice, speaker identification involves two main parts: the first part is the feature extraction and the second part is the feature matching.
Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreNeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among
Preparation and Identification of some new Pyrazolopyrin derivatives and their Polymerizations study
The proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location AP
... Show MoreHepatocellular carcinoma (HCC) is the third most common cause of cancer-related death. Therefore, it is critical for researchers to understand molecular biology in greater depth. In several diseases including cancer, abnormal miRNA expression has been linked to apoptosis, proliferation, differentiation, and metastasis. Many miRNAs have been studied in relation to cancer, including miR-122, miR-223, and others. Hepatitis B and C viruses are the most important global risk factors for HCC. This study is intended to test whether serum miRNAs serve as a potential biomarker for both HCC and viral infections HBV and C. The expression of miRNA in 64 serum samples was analyzed by RT-qPCR. Compared to healthy volunteers, HCC patients' sera expre
... Show MoreThe effected of the long transmission line (TL) between the actuator and the hydraulic control valve sometimes essentials. The study is concerned with modeling the TL which carries the oil from the electro-hydraulic servovalve to the actuator. The pressure value inside the TL has been controlled by the electro-hydraulic servovalve as a voltage supplied to the servovalve amplifier. The flow rate through the TL has been simulated by using the lumped π element electrical analogy method for laminar flow. The control voltage supplied to servovalve can be achieved by the direct using of the voltage function generator or indirect C++ program connected to the DAP-view program built in the DAP-card data acqu
... Show MoreProdigiosin is a ‘natural red pigment produced by Serratia marcescens which exhibits immunosuppressive and anticancer properties in addition to antimicrobial activities. This work presents an attempt to maximize the production of prodigiosin by two different strategies: one factor at time (OFAT) and statistical optimization. The result of OFAT revealed that sucrose and peptone were the best carbon and nitrogen sources for pigment production with concentration of prodigiosin of about 135 mg/ L. This value was increased to 331.6mg/ L with an optimized ratio of C/N (60:40) and reached 356.8 with pH 6 and 2% inoculum size at end of classical optimization. Statistical experimental design based on Response surface methodology was co
... Show MoreGroundwater is considered as one of the most important sources of fresh-water, on which many regions around the world depend, especially in semi-arid and arid regions. Protecting and maintaining groundwater is a difficult process, but it is very important to maintain an important source of water. The current study aims to assess the susceptibility of groundwater to pollution using the DRASTIC model along with the GIS environments and its tool boxes. A vulnerability map was created by relying on data collected from 55 wells surveyed by the researchers as well as archived records from governmental institutions and some international organizations. The results indicate that the region falls into three vulnerability functional zones , namely
... Show MoreThis study was focused on biotreatment of soil which polluted by petroleum compounds (Diesel) which caused serious environmental problems. One of the most effective and promising ways to treat diesel-contaminated soil is bioremediation. It is a choice that offers the potential to destroy harmful pollutants using biological activity. The capability of mixed bacterial culture was examined to remediate the diesel-contaminated soil in bio piling system. For fast ex-situ treatment of diesel-contaminated soils, the bio pile system was selected. Two pilot scale bio piles (25 kg soil each) were constructed containing soils contaminated with approximately 2140 mg/kg total petroleum hydrocarbons (TPHs). The amended soil:
... Show MoreThe assessment of the environmental impact of the cement industry using the Leopold Matrix is to determine the negative and positive impacts on the environment resulting from this industry, and what are the long-term and short-term effects, direct and indirect, and the amount of these effects and potential risks, and that this evaluation process is done through a number of methods, including Matrix method, including (Leopold).
The importance of the research because the cement occupies is of great importance in the world, especially in our country, Iraq, in the sector of construction and modernity, and the toxic emissions and solid waste produced by the production of this material. <
... Show More