Preferred Language
Articles
/
jih-1679
Boltzmann Machine Neural Network for Arabic Speech Recognition
...Show More Authors

Boltzmann mach ine neural network bas been used to recognize the Arabic speech.  Fast Fourier transl(>lmation algorithm has been used t() extract speciral 'features from an a caustic signal .

The  spectral  feature size is reduced by series of operations in

order to make it salable as input for a neural network which is used as a recogni zer by Boltzmann Machine Neural  network which has been used as a recognizer for phonemes . A training set consist of a number of Arabic phoneme repesentations, is used to train lhe neuntl network.

The neural network recognized Arabic. After Boltzmann Machine Neura l    network   training  the  system   with   few  selected   Arabic phonemes, the results came out to be very encouragi ng .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
Effects of Using Static Methods with Contourlet Transformation on Speech Compression
...Show More Authors

Compression of speech signal is an essential field in signal processing. Speech compression is very important in today’s world, due to the limited bandwidth transmission and storage capacity. This paper explores a Contourlet transformation based methodology for the compression of the speech signal. In this methodology, the speech signal is analysed using Contourlet transformation coefficients with statistic methods as threshold values, such as Interquartile Filter (IQR), Average Absolute Deviation (AAD), Median Absolute Deviation (MAD) and standard deviation (STD), followed by the application of (Run length encoding) They are exploited for recording speech in different times (5, 30, and 120 seconds). A comparative study of performance

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Dec 10 2017
Journal Name
Al-academy
The speech communication btween the shape and content in commercial advertising
...Show More Authors

The Main think that be kept by the speech communication as a concept traditionally being expressed on the subject or a certain idea of ​​a goal came on as needed functional addressed to recipients of benefits or likely to benefit from those rhetorical message through a speech importance and priority of the effect of not less than the effect of that letter, in science content role ends once you absorb it mentally, either in the art of design Valamadmon intellectual embodied through its interaction with the overall shape of the finished design, and often content is associated in the mind of the receiver through a letter communicative linked to the sense or the goal that meant the designer, and try to identify and explain. And meaning i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials
...Show More Authors

View Publication
Scopus (40)
Crossref (39)
Scopus Clarivate Crossref
Publication Date
Sun Feb 27 2022
Journal Name
Iraqi Journal Of Science
Digital Speech Files Encryption based on Hénon and Gingerbread Chaotic Maps
...Show More Authors

Speech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is proposed to encrypt digital speech files. Initially, the digital speech files are rearranged as a cubic model with six sides to scatter speech data. Furthermore, each side is encrypted by random keys that are created by using two chaotic maps (Hénon and Gingerbread chaotic maps). Encryption for each side of the cube is achieved, using the based map vector that is generated randomly by using a simple random function. Map vector that consists of six bits, each bit refers to one of the specific chaotic maps that generate a random key to encrypt each face of the cube. R

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Intelligent EMG Pattern Recognition Control Method for Upper-Limb Multifunctional Prostheses: Advances, Current Challenges, and Future Prospects
...Show More Authors

View Publication
Scopus (124)
Crossref (121)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Real time handwriting recognition system using CNN algorithms
...Show More Authors

Abstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition

... Show More
View Publication
Crossref
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
Human Action Recognition Based on Bag-of-Words
...Show More Authors

Human action recognition has gained popularity because of its wide applicability, such as in patient monitoring systems, surveillance systems, and a wide diversity of systems that contain interactions between people and electrical devices, including human computer interfaces. The proposed method includes sequential stages of object segmentation, feature extraction, action detection and then action recognition. Effective results of human actions using different features of unconstrained videos was a challenging task due to camera motion, cluttered background, occlusions, complexity of human movements, and variety of same actions performed by distinct subjects. Thus, the proposed method overcomes such problems by using the fusion of featur

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Utilization of Edge Information in Handwritten Numerals Recognition
...Show More Authors

The recognition of handwritten numerals has many applications in automatic identification and cognition. This research contains three experimented scenarios to recognize the handwritten English (i.e. Arabic) numerals. In the first scenario the bilinear interpolation of the image is used, while in the second scenario and after the bilinear interpolation is being applied, the Sobel operators are applied on the resulted interpolated image. In the third scenario which represents the last one, the effect of normalization of image dimensions is tested. 550 images of handwritten numerals were tested. Three types of tests were conducted for each scenario namely: trained-set test, not-trained-set test and comprehensive-set test. Depending on the

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 02 2022
Journal Name
Advances In Science And Technology Research Journal
Vein Biometric Recognition Methods and Systems: A Review
...Show More Authors

View Publication
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Use Dynamic Bayesian network to estimate the reliability of Adamia Water Network
...Show More Authors

Abstract\

In this research, estimated the reliability of water system network in Baghdad was done. to assess its performance during a specific period. a fault tree through static and dynamic gates was belt and these gates represent logical relationships between the main events in the network and analyzed using dynamic Bayesian networks . As it has been applied Dynamic Bayesian networks estimate reliability by translating dynamic fault tree to Dynamic Bayesian networks and reliability of the system appreciated. As was the potential for the expense of each phase of the network for each gate . Because there are two parts to the Dynamic Bayesian networks and two part of gate (AND), which includes the three basic units of the

... Show More
View Publication Preview PDF
Crossref