Preferred Language
Articles
/
bsj-3715
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pitch, tone, and frequency. The speaker's models are created and saved in the system environment and used to verify the identity required by people accessing the systems, which allows access to various services that are controlled by voice, speaker identification involves two main parts: the first part is the feature extraction and the second part is the feature matching.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 15 2011
Journal Name
Iraqi Journal Of Laser
Laser Hole Drilling of Stainless Steel 321H and Steel 33 Using 3D CO2 Laser CNC Machine
...Show More Authors

In present work an investigation for precise hole drilling via continuous wave (CW) CO2 laser at 150 W maximum output power and wavelength 10.6 μm was achieved with the assistance of computerized numerical controlled (CNC) machine and assist gases. The drilling process was done for thin sheets (0.1 – 0.3 mm) of two types of metals; stainless steel (sst) 321H, steel 33 (st). Changing light and process parameters such as laser power, exposure time and gas pressure was important for getting the optimum results. The obtained results were supported with computational results using the COMSOL 3.5a software code.

View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Active Vibration Suppression of Smart Cantilever Beam with Sliding Mode Observer Using Two Piezoelectric Patches
...Show More Authors

This paper presents a vibration suppression control design of cantilever beam using two piezoelectric ‎patches. One patch was used as ‎an actuator element, while the other was used as a sensor. The controller design was designed via the balance realization reduction method to elect the reduced order model that is most controllable and observable. ‎the sliding mode observer was designed to estimate six states from the reduced order model but three states are only used in the control law. Estimating a number of states larger than that used is in order to increase the estimation accuracy. Moreover, the state ‎estimation error is proved bounded. An ‎optimal LQR controller is designed then using the ‎estimated states with the slid

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Two of (Turnbull) and (Generalization Turnbulls)non-parametric methods in estimating conditional survival function (applied study on breast cancer patients)
...Show More Authors

   This research includes the application of non-parametric methods in estimating the conditional survival function represented in a method (Turnbull) and (Generalization Turnbull's) using data for Interval censored of breast cancer and two types of treatment, Chemotherapy and radiation therapy and age is continuous variable, The algorithm of estimators was applied through using (MATLAB) and then the use average Mean Square Error (MSE) as amusement  to the estimates and the results showed (generalization of Turnbull's) In estimating the conditional survival function and for both treatments ,The estimated survival of the patients does not show very large differences

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of The College Of Education For Women
Deception in Amber Heard and Johnny Depp’s Trials
...Show More Authors

Deception is defined as a linguistic and non-linguistic behavior that is used in interaction in order to make the addressees believe what is believed to be false or lack evidence. McCornack (1992) classifies deception into four manipulative strategies (i.e., fabrication, distortion, equivocation and concealment), other scholars argue that deception encompasses the strategies of “fabrication (outright lying), equivocation (being vague and ambiguous), or concealment (with holding relevant information) Thus, the present study investigates the deception strategies and motives that are used by Johnny Depp and Amber Heard during their defamation trials. Qualitative and quantitative methods are employed when analyzing the data in question. Th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Best Multiplier Approximation of Unbounded Periodic Functions in L_(p,∅_n ) (B),B=[0,2π] Using Discrete Linear Positive Operators
...Show More Authors

The purpose of this paper is to find the best multiplier approximation of unbounded functions in    –space by using some discrete linear positive operators. Also we will estimate the degree of the best multiplier approximation in term of modulus of continuity and the averaged modulus.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Nov 19 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Study of the impact of foreign direct investment in the Iraqi tax system using the factorial analysis: (principal components)
...Show More Authors

The tax system, like any other system, as a set of elements and parts that complement each other and are interrelated and interact to achieve specific goals, and is a natural  reflection of the economic, social and political conditions prevailing in society, and therefore the objectives of tax policy formulated in line with the objectives of economic policy in general, which means that any change in economic policy clearly affects fiscal policy measures and fiscal policy in particular.

The problem of searching for the impact of foreign direct investment in the Iraqi tax system was focused on the study  the of foreign direct investment and therole played in developing and improving the economic reality and its implicatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
An Experimental Study of the Server-based Unfairness Solutions for the Cross-Protocol Scenario of Adaptive Streaming over HTTP/3 and HTTP/2
...Show More Authors

Since the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the se

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of BASE methods with other methods for estimating the measurement parameter for WEBB distribution using simulations
...Show More Authors

  Weibull distribution is considered as one of the most widely  distribution applied in real life, Its similar to normal distribution in the way of applications, it's also considered as one of the distributions that can applied in many fields such as industrial engineering to represent replaced and manufacturing time ,weather forecasting, and other scientific uses in reliability studies and survival function in medical and communication engineering fields.

   In this paper, The scale parameter has been estimated for weibull distribution using Bayesian method based on Jeffery prior information as a first method , then enhanced by improving Jeffery prior information and then used as a se

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 05 2024
Journal Name
Al-academy
Reading in the Scenery of the performance and its developments
...Show More Authors

The importance of this research in studying the actor life existence on the stage through the performance art;where as all the literary theatrical dimensions didn't ignore the importance of the actor's performance.
So, it is shed a light on the nature of the scenery in the actor's performance and what its representations in the temporary directions ……..
The research set off from the imitation as a human instinct to the performance of the actor in post-modernity theater; so the researcher found that there is a question must be answered which is :Is the actor live a regression state in his theatrical performance ,or that the performance of the actor connect with collective conscience of human being which is repeated in certain

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology & Applied Science Research
An Enhanced Document Source Identification System for Printer Forensic Applications based on the Boosted Quantum KNN Classifier
...Show More Authors

Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref