The speech recognition system has been widely used by many researchers using different
methods to fulfill a fast and accurate system. Speech signal recognition is a typical
classification problem, which generally includes two main parts: feature extraction and
classification. In this paper, a new approach to achieve speech recognition task is proposed by
using transformation techniques for feature extraction methods; namely, slantlet transform
(SLT), discrete wavelet transforms (DWT) type Daubechies Db1 and Db4. Furthermore, a
modified artificial neural network (ANN) with dynamic time warping (DTW) algorithm is
developed to train a speech recognition system to be used for classification and recognition
purposes. Twenty three Arabic words were recorded fifteen different times in a studio
by one speaker to form a database. The performance of the proposed system using this
database has been evaluated by computer simulation using MATLAB package. The result
shows recognition accuracy of 65%, 70% and 80% using DWT (Db1), DWT (Db4) and SLT
respectively.
The turning process has various factors, which affecting machinability and should be investigated. These are surface roughness, tool life, power consumption, cutting temperature, machining force components, tool wear, and chip thickness ratio. These factors made the process nonlinear and complicated. This work aims to build neural network models to correlate the cutting parameters, namely cutting speed, depth of cut and feed rate, to the machining force and chip thickness ratio. The turning process was performed on high strength aluminum alloy 7075-T6. Three radial basis neural networks are constructed for cutting force, passive force, and feed force. In addition, a radial basis network is constructed to model the chip thickness ratio. T
... Show MoreIdentification by biological features gets tremendous importance with the increasing of security systems in society. Various types of biometrics like face, finger, iris, retina, voice, palm print, ear and hand geometry, in all these characteristics, iris recognition gaining attention because iris of every person is unique, it never changes during human lifetime and highly protected against damage. This unique feature shows that iris can be good security measure. Iris recognition system listed as a high confidence biometric identification system; mostly it is divide into four steps: Acquisition, localization, segmentation and normalization. This work will review various Iris Recognition systems used by different researchers for each recognit
... Show MoreThere are many techniques for face recognition which compare the desired face image with a set of faces images stored in a database. Most of these techniques fail if faces images are exposed to high-density noise. Therefore, it is necessary to find a robust method to recognize the corrupted face image with a high density noise. In this work, face recognition algorithm was suggested by using the combination of de-noising filter and PCA. Many studies have shown that PCA has ability to solve the problem of noisy images and dimensionality reduction. However, in cases where faces images are exposed to high noise, the work of PCA in removing noise is useless, therefore adding a strong filter will help to im
... Show MoreThe purpose of this paper to discriminate between the poetic poems of each poet depending on the characteristics and attribute of the Arabic letters. Four categories used for the Arabic letters, letters frequency have been included in a multidimensional contingency table and each dimension has two or more levels, then contingency coefficient calculated.
The paper sample consists of six poets from different historical ages, and each poet has five poems. The method was programmed using the MATLAB program, the efficiency of the proposed method is 53% for the whole sample, and between 90% and 95% for each poet's poems.
Data centric techniques, like data aggregation via modified algorithm based on fuzzy clustering algorithm with voronoi diagram which is called modified Voronoi Fuzzy Clustering Algorithm (VFCA) is presented in this paper. In the modified algorithm, the sensed area divided into number of voronoi cells by applying voronoi diagram, these cells are clustered by a fuzzy C-means method (FCM) to reduce the transmission distance. Then an appropriate cluster head (CH) for each cluster is elected. Three parameters are used for this election process, the energy, distance between CH and its neighbor sensors and packet loss values. Furthermore, data aggregation is employed in each CH to reduce the amount of data transmission which le
... Show MorePolitical speeches are represented in different shapes as political forum, events or as inaugural speech. This research critically analyzes the inaugural Speech of the President Donald Trump which was delivered on 20th ,January, 2017 from the site<www.cnn.com> retrieved on 10th ,May,2017. The objectives of the study are: First: classifying and discussing well known micro structures (linguistic feature) of the speech, and second: classifying the macro structures i.e. the delivered political inaugural speech in which he includes social structures. To reach to the objectives of the study, the researcher will adopt Norman Fairclough’s three dimensional Analytical Model(1989). Tracing the model, the speech was subm
... Show MoreConsidering the science of speech in the light of its purposes is an accurate scientific study that looks at it from its reality in which it originated, and its topic that it dealt with and its goals that it sought, and it follows its main course in the directions of approving the belief and inferring it, and repelling the objections to it, and this study comes to show the realism of the science of speech in its emergence Its subject and method, since its launch was from the reality of the Islamic nation and based on its intellectual needs, so its presence was necessary in the life of the Islamic nation because of its role in facing the challenges faced by the Islamic faith, and the dangers it was exposed to as a result of the intellectu
... Show MorePolitical speeches are represented in different shapes as political forum, events or as inaugural speech. This research critically analyzes the inaugural Speech of the President Donald Trump which was delivered on 20th ,January, 2017 from the site<www.cnn.com> retrieved on 10th ,May,2017. The objectives of the study are: First: classifying and discussing well known micro structures (linguistic feature) of the speech, and second: classifying the macro structures i.e. the delivered political inaugural speech in which he includes social structures. To reach to the objectives of the study, the researcher will adopt Norman Fairclough’s three dimensional Analytical Model(
... Show MoreHowever, the effects of these ideas are still evident
Think of those who follow the footsteps of Muslim scholars and thinkers.
Intellectual source of Gnostic Gnar
And in dealing with issues of Islamic thought
Annalisa intersecting trends of thought, Minya who melts in Masarya and supported him and believes in Bo and extremist Vue,
Lea, trying to throw it with a few times, looks at Elya look
There are those who stand in the opposite position
There are those who stand in a selective compromise, but this school of thought remains
G - the features of Islamic thought that believes in the mind and Imoto in the defense of
An intellectual station and generalized bar
Creed. In his study, the researcher wi
Recognizing cars is a highly difficult task due to the wide variety in the appearance of cars from the same car manufacturer. Therefore, the car logo is the most prominent indicator of the car manufacturer. The captured logo image suffers from several problems, such as a complex background, differences in size and shape, the appearance of noise, and lighting circumstances. To solve these problems, this paper presents an effective technique for extracting and recognizing a logo that identifies a car. Our proposed method includes four stages: First, we apply the k-medoids clustering method to extract the logo and remove the background and noise. Secondly, the logo image is converted to grayscale and also converted to a binary imag
... Show More