Audio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to those gotten from other popular methods inthis field, such as Zero Crossing Rate (ZCR), Amplitude Descriptor (AD), Short Time Energy (STE), and Volume (Vo). The test results indicated, that the attained averageaccuracy of classification is improved up to94.9232% for training set and 95.8666%for testing set.The classification performance of these two extracted featuresets is studied individually, and then they used together as one feature set. Theiroverall performance is investigated, the test results showed that the proposed methods give high classification rates for the audio.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreDiagnosing heart disease has become a very important topic for researchers specializing in artificial intelligence, because intelligence is involved in most diseases, especially after the Corona pandemic, which forced the world to turn to intelligence. Therefore, the basic idea in this research was to shed light on the diagnosis of heart diseases by relying on deep learning of a pre-trained model (Efficient b3) under the premise of using the electrical signals of the electrocardiogram and resample the signal in order to introduce it to the neural network with only trimming processing operations because it is an electrical signal whose parameters cannot be changed. The data set (China Physiological Signal Challenge -cspsc2018) was ad
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop
... Show MoreA new simple, sensitive and inexpensive method has been developed for the spectrophotometric determination of cisapride in pharmaceutical formulation. The turbidimetric method is based on the formation of the ion-pair complex between the drug and bromophenol blue (BPB) in presence of potassium chloride at pH= 2.6, with a maximum absorbance at 520 nm. The calibration graph is linear in the concentration range 5-50µg.ml-1 , with good correlation coefficient (r = 0.9989).The limit of detection was found to be 1.14 µg.ml-1 and no interference was observed from common excipients in the pharmaceutical preparation that contain cisapride with good accuracy and precision.
News feeds are at the forefront of news forms that are close to the public's attention for their rapid news content in two directions:
- its speed in summarizing events in one or two sentences easy to be understood and realized.
- highlight the most important contents of screenings or news broadcast.
The researchers felt that the importance of these brief news compared to news broadcast, breaking news and news subtitle are still ambiguous, as well as their contents.
The researchers selected the city of Baghdad as a community to research and prepare a questionnaire form containing (11) questions.
The questionnaires were distributed to a non-relative stratified
... Show MoreThis research was dealing with the aesthetic impact of encryption in form and content and aesthetic implications in the design of contemporary fabrics. That's where the design of the cloth is linked to the continuous development and continuous innovation and the pursuit of the all-new innovative designs and at the same time an unmarked Cryptographic with semantics and symbols reflect reality aesthetically pleasing and contains four chapters on the research :The first chapter discusses the research problem and its significance is the current quest ( encryption in form and content in contemporary designs fabrics and aesthetic implications ) in that it shows the importance of encryption in the design of fabrics and foundation design configu
... Show MoreObjective: This research was carried out in rats in a special place of the laboratory of histopathological diseases in the period 6/9/2018 until 23/11/2018, this study to detect effect of the addition of the alcohol extract of ginger in the reduction of fat in liver tissue of rats. Method: Eight groups and replicates for each group. The groups were homogenous in weights and were placed in 13 cages. Each group consisted of 10 rat and at 5 fares each. In the first treatment, rat were fed on regular feeding without adding and feeding rats in the second treatment sessions add to it the alcoholic extract of ginger in Turkey 150 mg/kg. The third group is the same as the normal food after adding the alcohol extract of ginger at a concentration of
... Show More