Deep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to evaluate the pronunciation of the Arabic alphabet. Voice data from six school children are recorded and used to test the performance of the proposed method. The padding technique has been used to augment the voice data before feeding the data to the CNN structure to developed the classification model. In addition, three other feature extraction techniques have been introduced to enable the comparison of the proposed method which employs padding technique. The performance of the proposed method with padding technique is at par with the spectrogram but better than mel-spectrogram and mel-frequency cepstral coefficients. Results also show that the proposed method was able to distinguish the Arabic alphabets that are difficult to pronounce. The proposed method with padding technique may be extended to address other voice pronunciation ability other than the Arabic alphabets.
Controls Scanning on the slippers a study fiqhiat Comparison
The subject of this research is an important topic, which is frequently repeated, and people need to know its wisdom, and has made it in front and the preface and three detectives, showed through discussion the meaning of the survey on the socks, its wisdom, its rules and conditions, and the duration of the survey on it, spoiled and reasoned and compared to the doctrinal doctrines, And the most correct statement of words I have concluded with a number of things, as follows:
- The need to ensure that the slippers are clean, visible and inwa
There are different types of corruptions such as administrative, political, economic and financial corruption. The corruption forms also varied such as bribery, nepotism and extortion. All types and forms of corruption play significant role in the all economic variables generally and on investments in particular, and the corruption used to be an intermediate means in reducing the rate of economic growth. The corruption contributes in reducing the domestic investments via pay bribery by investors to officials’ persons for supplemental contracts and tenders which finally leads to reduction in the investment efficiency. The corruption also contributes in rise of operational costs for the investment projects. In additio
... Show MoreThe objective of the research is to identify the nature of voluntary disclosure of insurance services and its impact on the financial performance of Iraqi insurance companies by knowing the relationship between increasing disclosure of financial services and financial performance indicators of insurance companies.In order to achieve this objective, the research was applied to a sample of the Iraqi insurance companies listed in the Iraqi Stock Exchange (Al Amin Insurance Company, Al Ahlia Insurance, Dar Al Salam Insurance, Gulf Insurance, Al Hamra Insurance) and based on their published financial statements (2014-2015) ) And by analyzing the sample lists were connected to the research objectives.The main conclusion of the study is that in
... Show MoreThe research has been based on two main variables (information and communication technology) and the quality of blended education (physical and electronic), aiming to reveal the relationship between four dimensions (physical devices, software, databases, communication networks) and the elements of education represented by (the teacher, the student, the teaching process, curriculum). The methodology and post-analysis-based research were conducted at the Technical College of Management / Baghdad through polling the opinions of a random sample that included (80) teachers out of (86) and the number of students (276) representing a random sample from all departments of the college (for the morning study) out of (3500) stud
... Show MoreLaboratory studies were conducted at the biological control unit, college of Agriculture, University of Baghdad to evaluate some biological aspects of the predator Chilocorus bipustulatus (Coleoptera: Coccinellidae), which is considered one of the most important predators on many insect pests, especially the scale insect, Parlatoria blanchardi, (Homoptera: Diaspididae) on date palms. The results showed that biological parameters of the predator were varied according to different degree of temperature. Egg incubation period was significantly different and reached to 7.5 and 5.44 day at 25 and 30°C respectively, Fertility was the same 100% at both temperature degrees. Larval growth periods were 17.41 and 16.12 day as well as the mortality
... Show MoreThe study aimed to evaluate injuries and economic losses which caused by rose beetle Maladerainsanabilis (Brenske) on ornamental and fruit plants as introduced insect in Iraq during 2015 and determine infested host plants in addition to evaluate efficacy of pathogenic fungi Metarhiziumanisopiliae (1x10⁹ spore/ ml) and Beauvariabassiana (1x10⁸spore/ ml) in mortality of insect larvae in laboratory and field.The results showed that the insect was polyphagous infested many host plants (20 host plant)Which caused degradation and dead the plants through adult feeding on leaves and flower but large injury caused by larvae feeding on root plants which caused obligate dead to infested plant, the percentage mortality of rose plants 68.6%, pear
... Show MoreABSTRACT
The results showed that the organic fertilizer mixture (1:1) 30 tons/ha with chemical fertilization recorded the lowest level of bulk density of 1.2 g/cm3, the organic fertilizer mixture (1:1) 30 tons/ha with chemical fertilization recorded the highest percentage of aggregation stability amounting to 16.17%, the organic fertilizer palm fronds recorded the highest level of ready water with an average of 5.50 cm3/cm3 and the organic fertilizer mixture (1:1) 30 tons/ha without chemical fertilization recorded the highest level of ready water as it reached 6.93%, the or
... Show MoreFinding a path solution in a dynamic environment represents a challenge for the robotics researchers, furthermore, it is the main issue for autonomous robots and manipulators since nowadays the world is looking forward to this challenge. The collision free path for robot in an environment with moving obstacles such as different objects, humans, animals or other robots is considered as an actual problem that needs to be solved. In addition, the local minima and sharp edges are the most common problems in all path planning algorithms. The main objective of this work is to overcome these problems by demonstrating the robot path planning and obstacle avoidance using D star (D*) algorithm based on Particle Swarm Optimization (PSO)
... Show MoreWithin the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amo
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show More