Preferred Language
Articles
/
bsj-3715
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pitch, tone, and frequency. The speaker's models are created and saved in the system environment and used to verify the identity required by people accessing the systems, which allows access to various services that are controlled by voice, speaker identification involves two main parts: the first part is the feature extraction and the second part is the feature matching.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
Using Social Media sites by the Iraqi women and the Achieved The Use of Iraqi Women of Social Networking Sites and the Satisfactions Generated from Them.: A Survey Study of the City of Baghdad
...Show More Authors

The problem of this research lies in the fact that there is a lack of accurate scientific perceptions about the size of the use of Iraqi women’s social networking sites and the motives behind this use and the expectations generated by them.
The goals of the research are as follows:
1- Determine the extent of Iraqi women’s use of social networking sites (Facebook, YouTube, twitter, and Instagram).
2- Investigative the motives behind the use of social networking sites by Iraqi women.
3- Detecting the repercussions of Iraqi women’s use of social networking sites (Facebook, you tube, twitter, and Instagram).
The research is classified as a descriptive one. The researchers use the survey methodology. The research commu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
The Energy Spectra and Heat Capacity of GaAs Gaussian Quantum Dot in an External Magnetic Field
...Show More Authors

In this paper, a theoretical study of the energy spectra and the heat capacity of one electron quantum dot with Gaussian Confinement in an external magnetic field are presented. Using the exact diagonalization technique, the Hamiltonian of the Gaussian Quantum Dot (GQD) including the electron spin is solved. All the elements in the energy matrix are found in closed form. The eigenenergies of the electron were displayed as a function of magnetic field, Gaussian confinement potential depth and quantum dot size. Explanations to the behavior of the quantum dot heat capacity curve, as a function of external applied magnetic field and temperature, are presented.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 07 2021
Journal Name
2021 14th International Conference On Developments In Esystems Engineering (dese)
Object Detection and Distance Measurement Using AI
...Show More Authors

View Publication
Scopus (26)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of The College Of Education For Women
Cyber Crime and its Risks on Children
...Show More Authors

Cybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order t

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 27 2020
Journal Name
Journal Of The College Of Education For Women
The Effect of Using Online Automated Feedback on Iraqi EFL Learners’ Writings at University Level
...Show More Authors

Feedback on students’ assignments can be done in many different ways. Nowadays, the growing number of students at universities has increased the burden on the instructors to give feedback on students’ writings quickly and efficiently. As such, new methods of modern online automated feedback tools, such as Hemingway app and ecree,are used to assist and help instructors. Hence, this research is an explanatory study to examine the effect of using the online automated feedback on some Iraqi EFL learners’ writings at the university level. The study comprised 60 students enrolled in an English language course at the University of Anbar. They were divided randomly into two groups, experi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Dec 26 2017
Journal Name
Al-khwarizmi Engineering Journal
Fuzzy Wavenet (FWN) classifier for medical images
...Show More Authors

 

    The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.

  In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.

&n

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 15 2019
Journal Name
Al-khwarizmi Engineering Journal
Effect Use of Two Chemical Compounds Sodium Nitrate and Sodium Silicate as Corrosion Inhibitor to Steel Reinforcement
...Show More Authors

Corrosion of steel reinforcement is one of the biggest problems facing all countries in the world like bridges in the beach area and marine constructions which lead to study these problems and apply some economical solutions. According to the high cost of repair for these constructions, were studied the effect of using kind of chemical compounds sodium nitrite(NaNO2) and sodium silicate(Na2SiO3) as corrosion inhibitors admixture for steel bars that immersed partially in electrolyte solution (water + sodium chloride in 3% conc.) (Approximately similar to the concentration of salt in sea water). The two inhibitors above added each one to the electrolyte solution at concentrations (0.5%, 1% and 2%) for both

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
On Semigroup Ideals and Right n-Derivation in 3-Prime Near-Rings
...Show More Authors

 The current paper studied the concept of right n-derivation satisfying certified conditions on semigroup ideals of near-rings and some related properties. Interesting results have been reached, the most prominent of which are the following: Let M be a 3-prime left near-ring and A_1,A_2,…,A_n are nonzero semigroup ideals of M, if d is a right n-derivation of M satisfies on of the following conditions,
d(u_1,u_2,…,(u_j,v_j ),…,u_n )=0 ∀ 〖 u〗_1 〖ϵA〗_1 ,u_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n ϵA〗_u;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=0 ∀u_1,v_1 〖ϵA〗_1,u_2,v_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n,v_n ϵA〗_u ;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=(u_

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref