Preferred Language
Articles
/
jcoeduw-717
SPEECH RECOGNITION OF ARABIC WORDS USING ARTIFICIAL NEURAL NETWORKS
...Show More Authors

The speech recognition system has been widely used by many researchers using different
methods to fulfill a fast and accurate system. Speech signal recognition is a typical
classification problem, which generally includes two main parts: feature extraction and
classification. In this paper, a new approach to achieve speech recognition task is proposed by
using transformation techniques for feature extraction methods; namely, slantlet transform
(SLT), discrete wavelet transforms (DWT) type Daubechies Db1 and Db4. Furthermore, a
modified artificial neural network (ANN) with dynamic time warping (DTW) algorithm is
developed to train a speech recognition system to be used for classification and recognition
purposes. Twenty three Arabic words were recorded fifteen different times in a studio
by one speaker to form a database. The performance of the proposed system using this
database has been evaluated by computer simulation using MATLAB package. The result
shows recognition accuracy of 65%, 70% and 80% using DWT (Db1), DWT (Db4) and SLT
respectively.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 30 2024
Journal Name
Iraqi Journal Of Science
Overlapping Structure Detection in Protein-Protein Interaction Networks Using a Modified Version of Particle Swarm Optimization
...Show More Authors

In today's world, the science of bioinformatics is developing rapidly, especially with regard to the analysis and study of biological networks. Scientists have used various nature-inspired algorithms to find protein complexes in protein-protein interaction (PPI) networks. These networks help scientists guess the molecular function of unknown proteins and show how cells work regularly. It is very common in PPI networks for a protein to participate in multiple functions and belong to many complexes, and as a result, complexes may overlap in the PPI networks. However, developing an efficient and reliable method to address the problem of detecting overlapping protein complexes remains a challenge since it is considered a complex and har

... Show More
View Publication
Scopus Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
A Comparative Study of Single-Constraint Routing in Wireless Mesh Networks Using Different Dynamic Programming Algorithms
...Show More Authors

Finding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorith

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Estimation of Heavy Metals Contamination in the Soil of Zaafaraniya City Using the Neural Network
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages (jcl)
"Words of threat in Hebrew language- Pragmatic study": ביטויי האיום בלשון העברית (עיון פרגמטי)
...Show More Authors
The present study approaches an analytical and deliberative analysis of the words of threat in number of Hebrew language examples through exploring all the reasons and conditions of threat act. Moreover, and because of the difficulty to make a distinction between the two verbs, the study discusses the use of the verbs “to warn and to threat” as one of the most common types verbs used in Hebrew language that implies internal threat. Threat is one of most prominent speech acts that language users resort to as a means to achieve intended threat goals. In Hebrew, it is expressed in different ways and depends on different aspects, including (internal and external context, circumstances in which the threat is made, the
... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of The College Of Languages (jcl)
Investigating the Mastering of the Pronunciation of Weak and Strong Forms of English Function Words
...Show More Authors

    The weak and strong forms are so called because it is not their lexical content that primary matter, but the role they have in the sentence. The problematic confusion, our students encounter, in recognizing and producing the correct pronunciation of weak and strong forms of the English function words is the main incentive behind conducting  this study. In order to gather the data, this paper used two types of tests: a recognition test and a production test. The general results reached  through the analysis of the students' answers seem to conform to the researcher's assumption: students face a critical problem in recognizing and producing correct pronunciation of the weak and strong forms of the English funct

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Environmental Pollution
Prediction of sediment heavy metal at the Australian Bays using newly developed hybrid artificial intelligence models
...Show More Authors

View Publication
Crossref (94)
Crossref
Publication Date
Fri Dec 22 2006
Journal Name
Journal Of Planner And Development
Optimizing the location of banks using the Gis
...Show More Authors

the banks are one of the public services that must be available in the city to ensure easy financial dealings between citizens and state departments and between the state departments with each other and between the citizens themselves and to ensure easy access to it, so it is very important to choose the best location for the bank, which can serve the largest number of The population achieves easy access. Due to the difficulty of obtaining accurate information dealing with the exact coordinates and according to the country's specific projection, the researcher will resort to the default work using some of the files available in the arcview program

View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
2018 International Conference On Advanced Science And Engineering (icoase)
Real-Time Face Tracking and Recognition System Using Kanade-Lucas-Tomasi and Two-Dimensional Principal Component Analysis
...Show More Authors

View Publication
Scopus (13)
Crossref (8)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Res Militaris
The conversational imperative in Al Qiyam Al Fatimy speech
...Show More Authors

This study falls within the core of the deliberative theory, as this research seeks to highlight the concept of dialogical imputation that is present in all the discourses received by the recipient, and that this is not limited to dialogues, and that is why it is called (deliberative imperative). This is in agreement with the deliberative and functional approach that sees literary discourse as a dialogical and fulfilling necessity, due to its attachment to artistic connotations and submerged meanings in the saying. The allotted obligation and its impact on determining the purposes: The specific implication represented an important axis of pragmatic research, and a major concern in the work of discourse analysis. Because of its great importa

... Show More
View Publication
Scopus
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Evaluation Method of Mesh Protocol over ESP32 and ESP8266
...Show More Authors

Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (8)
Scopus Clarivate Crossref