Preferred Language
Articles
/
bsj-6213
Arabic Speech Classification Method Based on Padding and Deep Learning Neural Network
...Show More Authors

Deep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to evaluate the pronunciation of the Arabic alphabet. Voice data from six school children are recorded and used to test the performance of the proposed method. The padding technique has been used to augment the voice data before feeding the data to the CNN structure to developed the classification model. In addition, three other feature extraction techniques have been introduced to enable the comparison of the proposed method which employs padding technique. The performance of the proposed method with padding technique is at par with the spectrogram but better than mel-spectrogram and mel-frequency cepstral coefficients. Results also show that the proposed method was able to distinguish the Arabic alphabets that are difficult to pronounce. The proposed method with padding technique may be extended to address other voice pronunciation ability other than the Arabic alphabets.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Modified Elman Spike Neural Network for Identification and Control of Dynamic System
...Show More Authors

View Publication
Scopus (18)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
Recognition of Human Facial Expressions Using DCT-DWT and Artificial Neural Network
...Show More Authors

Facial expressions are a term that expresses a group of movements of the facial fore muscles that is related to one's own human emotions. Human–computer interaction (HCI) has been considered as one of the most attractive and fastest-growing fields. Adding emotional expression’s recognition to expect the users’ feelings and emotional state can drastically improves HCI. This paper aims to demonstrate the three most important facial expressions (happiness, sadness, and surprise). It contains three stages; first, the preprocessing stage was performed to enhance the facial images. Second, the feature extraction stage depended on Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) methods. Third, the recognition stage w

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Feature Extraction of Human Facail Expressions Using Haar Wavelet and Neural network
...Show More Authors

One of the challenging and active research topics in the recent years is Facial Expression. This paper presents the method to extract the features from the facial expressions from still images. Feature extraction is very important for classification and recognition process. This paper involve three stages which contain capture the images, pre-processing and feature extractions. This method is very efficient in feature extraction by applying haar wavelet and Karhunen-Loève Transform (KL-T). The database used in this research is from Cohen-Kanade which used six expressions of anger, sadness fear, happiness, disgust and surprise. Features that have been extracted from the image of facial expressions were used as inputs to the neural networ

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 18 2022
Journal Name
Ieee Access
Moderately Multispike Return Neural Network for SDN Accurate Traffic Awareness in Effective 5G Network Slicing
...Show More Authors

Due to the huge variety of 5G services, Network slicing is promising mechanism for dividing the physical network resources in to multiple logical network slices according to the requirements of each user. Highly accurate and fast traffic classification algorithm is required to ensure better Quality of Service (QoS) and effective network slicing. Fine-grained resource allocation can be realized by Software Defined Networking (SDN) with centralized controlling of network resources. However, the relevant research activities have concentrated on the deep learning systems which consume enormous computation and storage requirements of SDN controller that results in limitations of speed and accuracy of traffic classification mechanism. To fill thi

... Show More
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Satellite image classification using proposed singular value decomposition method
...Show More Authors

In this work, satellite images for Razaza Lake and the surrounding area
district in Karbala province are classified for years 1990,1999 and
2014 using two software programming (MATLAB 7.12 and ERDAS
imagine 2014). Proposed unsupervised and supervised method of
classification using MATLAB software have been used; these are
mean value and Singular Value Decomposition respectively. While
unsupervised (K-Means) and supervised (Maximum likelihood
Classifier) method are utilized using ERDAS imagine, in order to get
most accurate results and then compare these results of each method
and calculate the changes that taken place in years 1999 and 2014;
comparing with 1990. The results from classification indicated that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
Biometric Identification System Based on Contactless Palm-Vein Using Residual Attention Network
...Show More Authors

Palm vein recognition technology is a one of the most effective biometric technologies for personal identification. Palm acquisition techniques are either contact-based or contactless-based. The contactless-based palm vein system is considered more accurate and efficient when used in modern applications, but it may suffer from problems like pose variations and the delay in the matching process. This paper proposes a contactless-based identification system for palm vein that involves two main steps; First, the central region of the palm is cropped using fast extract region of interest algorithm, then the features are extracted and classified using altered structure of Residual Attention Network, which is a developed version of convolution

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Finite Element Neural Network And Its Applications To Forward And Inverse Problems
...Show More Authors

In this paper, first we   refom1Ulated   the finite   element  model

(FEM)   into   a   neural   network   structure   using   a   simple   two   - dimensional problem. The structure of this neural network is described

, followed  by its   application   to   solving  the forward    and  inverse problems. This model is then extended to the general case and the advantages and  di sadvantages  of  this  approach  are  descri bed  along with an analysis  of  the sensi tivity   of

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Lean accounting and its rolls for calculated costs on value stream
...Show More Authors

At the last two decades , The environment has witnessed tremendous changes in many fields with the huge competition , various technological development and customer satisfaction , that are reflected in economic units a doption for lean production system .                 

      Lean Accounting that has appeared as aresponse for changes occurred of economic units adoption for lean accounting system instead of wide production system : through it management of economic units has been changed from management by top departments into management by value flows : has provide new method for accounting costs according to value flow

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Estimating concentration of toxic ions Arsenic in water by using Photonic Crystal Fiber based on Surface Plasmon Resonance (SPR)
...Show More Authors

In this work, an enhanced Photonic Crystal Fiber (PCF) based on Surface Plasmon Resonance (SPR) sensor using a sided polished structure for the detection of toxic ions Arsenic in water was designed and implemented. The SPR curve can be obtained by polishing the side of the PCF after coating the Au film on the side of the polished area, the SPR curve can be obtained. The proposed sensor has a clear SPR effect, according to the findings of the experiments. The estimated signal to Noise Ratio (SNR), sensitivity (S), resolution (R), and Figures of merit (FOM) are approaching; the SNR is 0.0125, S is 11.11 μm/RIU, the resolution is 1.8x〖10〗^(-4), and the FOM is 13.88 for Single-mode Fiber- Photonic Crystal Fiber- single mode Fiber (SMF-P

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication