The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pitch, tone, and frequency. The speaker's models are created and saved in the system environment and used to verify the identity required by people accessing the systems, which allows access to various services that are controlled by voice, speaker identification involves two main parts: the first part is the feature extraction and the second part is the feature matching.
Ticks (Acari: Ixodidae) are ectoparasites that infest livestock in every geographic region of the world and are vectors of several viral, bacterial, and protozoan pathogens to both animals and humans. There is little information is available is about tick presence in Buffalo Bubalus bubalis (Linnaeus, 1758) (Artiodactyla, Bovidae) in Iraq. The current study determined the species of ticks parasitizing Buffalo in some central and southern regions included: Baghdad (Al Fathelia), Karbala (Al-Hussainia), Wasit (Kut and Al-Suwairah), Al-Qadisia (Al- Diwaniyah, Al- Saniya, Al-Mihnawea, and Afak), Thi Qar (Al-Nasiriyah and Al-chibayish), Missan (Amara and Qalaat Salih) and Basrah (Al-Haretha, Al-Madena and Al-Deer). A total of 150 Buffal
... Show MoreConstruction is a hazardous industry with a high number of injuries. Prior research found that many industry injuries can be prevented by implementing an effective safety plan if prepared and maintained by qualified safety personnel. However, there are no specific guidelines on how to select qualified construction safety personnel and what criteria should be used to select an individual for a safety position in the United States (US) construction industry. To fill this gap in knowledge, the study goal was to identify the desired qualifications of safety personnel in the US construction industry. To achieve the study goal, the Delphi technique was used as the main methodology for determining the desired qualifications for constructio
... Show MoreSteganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.
The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show MoreIn present work an investigation for precise hole drilling via continuous wave (CW) CO2 laser at 150 W maximum output power and wavelength 10.6 μm was achieved with the assistance of computerized numerical controlled (CNC) machine and assist gases. The drilling process was done for thin sheets (0.1 – 0.3 mm) of two types of metals; stainless steel (sst) 321H, steel 33 (st). Changing light and process parameters such as laser power, exposure time and gas pressure was important for getting the optimum results. The obtained results were supported with computational results using the COMSOL 3.5a software code.
This paper presents a vibration suppression control design of cantilever beam using two piezoelectric patches. One patch was used as an actuator element, while the other was used as a sensor. The controller design was designed via the balance realization reduction method to elect the reduced order model that is most controllable and observable. the sliding mode observer was designed to estimate six states from the reduced order model but three states are only used in the control law. Estimating a number of states larger than that used is in order to increase the estimation accuracy. Moreover, the state estimation error is proved bounded. An optimal LQR controller is designed then using the estimated states with the slid
... Show More
Diazotization reaction between quinolin-2-ol and (2-chloro-1-(4-(N-(5-methylisoxazol-3-yl)sulfamoyl)phenyl)-2l4-diazyn-1-ium was carried out resulting in ligand-HL, this in turn reacted with the next metal ions (Ni2+, Pt4+, Pd2+, and Mn2+) forming stable complexes with unique geometries such as (tetrahedral for both Ni2+ and Mn2+, octahedral for Pt4+ and square planer for Pd2+ ). The creation of such complexes was detected by employing spectroscopic means involving ultraviolet-visible which proved the obtained geometries, fourier transfer proved the formation of azo group and the coordination with metal ion through it. Pyrolysis (TGA &
... Show MoreAbstract:
The achievement of economic and social welfare for individual is the main target to all policies that adopted by all countries worldwide either were economic, social, political or others. The obtaining of education by individuals and especially the higher education is one of the most important determinates in achieving the wellbeing and lasted economic development. This is because via the higher education new fields can be opened in front of individuals in order to get adequate jobs associated with their scientific specialization. This is allowing educated individuals gain higher income that can reduce the gap of income inequality.
Thus, this paper aims to analysis the n
... Show MoreABSTRACT:
The study aims at expounding the correlation and effect between the Human resource development strategy and Quality Municipality Service within a theoretical framework and a practical framework conducted at Directorate Of Municipalities in holy Karbala . The researcher found during a pilot study that there isn’t enough care paid by the Directorate Of Municipalities in developing its human resources using one strategy or a number of strategies and their effect on the Quality Municipality Service. Thus a number of research questions were set concerning the existence of clear perception in the Directorates Of Municipalities concerning the strategies of developing both the human resource an Qualit
... Show MoreThe purpose of this paper is to find the best multiplier approximation of unbounded functions in –space by using some discrete linear positive operators. Also we will estimate the degree of the best multiplier approximation in term of modulus of continuity and the averaged modulus.