The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pitch, tone, and frequency. The speaker's models are created and saved in the system environment and used to verify the identity required by people accessing the systems, which allows access to various services that are controlled by voice, speaker identification involves two main parts: the first part is the feature extraction and the second part is the feature matching.
This paper deals with the modeling of a preventive maintenance strategy applied to a single-unit system subject to random failures.
According to this policy, the system is subjected to imperfect periodic preventive maintenance restoring it to ‘as good as new’ with probability
p and leaving it at state ‘as bad as old’ with probability q. Imperfect repairs are performed following failures occurring between consecutive
preventive maintenance actions, i.e the times between failures follow a decreasing quasi-renewal process with parameter a. Considering the
average durations of the preventive and corrective maintenance actions a
... Show Moreشكلت التطورات التكنولوجية في وسائل التواصل الاجتماعي الناجمة عن العولمة معلم رئيسي في تحولات التنظيمات الإرهابية، وإنتاج انماط جديدة من الإرهابيين والمتطرفين القادرين على التفاعل مع الثورة المعلوماتية والاتصالية. ان معظم الجرائم الإرهابية الإلكترونية مرتبطة بالإنترنت وهو المسرح المفضل للمتطرفين فالأول يقتل والثاني يسوغ ويحرض ويجند، والذي جعل الإنترنت وسيلة فعالة كونها سهلة الاستخدام وسريعة الوصول إلى
... Show MoreConventional identification of three coccoid green algae isolates was attempted to characterize the studied algae morphologically under compound microscope, which demonstrated confusional phenomenal convergence; all were classified microscopically as the green alga Chlorella vulgaris Beijerinck, 1890.
Phylogenetic studies were conducted to settle the argument about the phenotype by studying the genotype. Genotype the promising field in advance classification by using 18S rRNA and compared to GenBank database using to search the related sequences. The determined sequences showed high a similarity to the strains registered in GenBank.
&
... Show MoreComplexes of 1-phenyl-3-(2(-5-(phenyl amino)-1,3,4-thiadiazole-2-yl)phenyl) thiourea have been prepared and characteizedby elemental analysis, Ff-[R, and u.v./ visible spectra moreover,determination of metal content M%o by flame atomic absorptionspectroscopy, molar conductance in DMSO solution and magneticmoments (peffl.The result showed that the ligand (L) was coordinated to Mn+2, Ni+2,Ct+2,2n+2,Cd+2, and Hg+2 ions through the nitrogen atoms and sulpheratoms.From the result obtained, rhe following general formula [MLCl2] hasbeen given for the prepared complexes with an octahedral geometryaround the metal ions for all complexes.where M= Mn+2, Ni+2, cu+2, zn+2, cd+2, and Hg+2 l= l-phenyl-3-(2-(5-(phenyl amino
... Show MoreOne hundred fifty bacterial strains were isolated from patients with urinary tract infections (UTIs). They were belong to ten different species of gram-negative bacteria and to two genera of gram–positive bacteria. E. coli was the major causative agent and comprise 40% of all cases. Klebsiella pneumoniae and Proteus mirabilis were second and third with 18.67% & 18.0% respectively. Other gram-negative bacteria were belong to the genera Enterobacter, Acinitobacter, Pseudomonas, Citrobacter and Serratia. Ten cases (6.67%) were caused by genus Staphylococcus and seven (4.66%) were caused by Streptococcus. Out of the 150 positive cases, 96(64%) were from female patients, while 54(36%) were from males. High percentage of all
... Show MoreThere is a variety of artificial foot designs variable for use with prosthetic legs . Most of the design can be divided into two classes, articulated and non-articulated feet. one common non-articulated foot is the SACH . The solid ankle cushion heel foot referred to as the SACH foot has a rigid keel .
One key or the key factor in designing a new prosthesis is in the analysis of a patients response .
This view is the most important because if the foot does not provide functional , practical or cosmetically acceptable characteristics the patient will not feel comfortable with the prosthesis , therefore design and manufacturing a new foot is essential, this foot made from polyethylene, its different shape and characte
... Show MoreF index is a connected graph, sum of the cubes of the vertex degrees. The forgotten topological index has been designed to be employed in the examination of drug molecular structures, which is extremely useful for pharmaceutical and medical experts in understanding the biological activities. Among all the topological indices, the forgotten index is based on degree connectivity on bonds. This paper characterized the forgotten index of union of graphs, join graphs, limits on trees and its complements, and accuracy is measured. Co-index values are analyzed for the various molecular structure of chemical compounds
The concept of self is considered one of the important dimensions in the human personality, because feeling of self is an important characteristic in this phase from the psychological point of view.
The first source which forms the concept of self is the physical image, where the built and appearance of the body is considered among the vital matters which determine the person's image of himself/herself.
The current research aims to:
1) Identify the level of physical self concept at the kindergarten children.
2) Identify the level of psychological self concept at the kindergarten children.
3) Iden
... Show More