The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pitch, tone, and frequency. The speaker's models are created and saved in the system environment and used to verify the identity required by people accessing the systems, which allows access to various services that are controlled by voice, speaker identification involves two main parts: the first part is the feature extraction and the second part is the feature matching.
With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreDiode lasers are becoming popular in periodontal surgery due to their highly absorption by pigments such as melanin and hemoglobin their weak absorption by water and hydroxyapatite makes them safe to be used around dental hard tissues. Objective: The aim of the present study was to evaluate the efficiency of diode laser in performing gingivectomy in comparison to conventional scalpel technique in patients with chronic inflammatory enlargement. Materials and methods: Thirty patients were selected for this study. All of them required surgical treatment of gingival enlargements and were randomly divided into two groups: Control group (treated by scalpel and include sixteen patients) and study group (treated with diode laser 940nm and includ
... Show MoreThe fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show More The study was performed to isolate and identify the Myxococcus
xanthus from (50) samples of grave soils .Special growth conditions had been used to support the growth of M.
xanthus and to suppressed the growth of other microorganisms like (Drying , High concentration of antibiotics and specific growth media)
M. . xanthus isolates had been subjected to the morphological, cultural and biochemical examinations for identification . Results obtaind could be summarized as follows : 1. Myxobacteria were found as normal flora inhabitants of the arid soils. 2. Ten local isplates of M. xanthus out of (50) soil samples were isolated
Enterococci are usually encountered and predominate in oral infections, especially those associated with dental root canal infections of necrotic pulp and periodontitis. This study aimed to detect and identify Enterococcus faecium isolated from infected root canals, using polymerase chain reaction ( PCR). Thirty samples were collected from patients with necrotic pulp, infected root canals, and endodontic treatment failure, attending the Conservative Treatment Department, College of Dentistry, Mosul University, Dental Teaching Hospital. The samples were obtained by inserting sterile paper points into the root canals and transferred in brain heart infusion broth vials to be inoculated in a selective M-Enterococcus Agar Base . T
... Show MoreTwenty purified isolates were obtained by using different soil sources, only twelve isolates belonging to Aspergillus genera depending on cultural and morphological characterization. The isolates were used as alkaline protease producer. The highest proteolytic, enzymatic activity (95.83U/ml) was obtained from
Azadirachtin is a naturally occurring substance that belongs to an organic molecule class which is called tetranortriterpenoids. It is on of the most powerful plant derived insecticides known, its structure is similar to insect hormones called ecdysoncs (Molting Hormone), which control the process of metamorphosis. Azadirachtin has been isolated from fruits of Melia azedarach L. The structure of this compound was determined by spectral studies (IR spectra and GC Mass spectra) and denitrified by then layer chromotochraphy (TLC).
The production of polyhydroxyalkanoates PHAs from biopolymer degrading bacteria was examined