Preferred Language
Articles
/
kxfrNY8BVTCNdQwC2GI_
BEYOND WORDS: HARNESSING SPEECH SOUND FOR SPEAKER AGE AND GENDER DETECTION USING 1D CNN ARCHITECTURE WITH SELF-ATTENTION MECHANISM
...Show More Authors

Beyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attention-based convolutional neural network (CNN) model. To address age ambiguity, we evaluate the effects of different loss functions such as focal loss and Kullback-Leibler (KL) divergence loss. Additionally, we evaluate the accuracy of the estimation at different durations of speech. Experimental results from the Common Voice dataset underscore the efficacy of our approach, showcasing an accuracy of 87% for male speakers, 91% for female speakers and 89% overall accuracy, and an accuracy of 99.1% for gender prediction.

Scopus Crossref
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (33)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Sun Apr 06 2014
Journal Name
Journal Of Educational And Psychological Researches
Positive thinking and its relation to self academic motivation and the trend towards teaching profession among the students of education colleges
...Show More Authors

The research aims to know the relation between positive thinking and self academic motivation, trend towards teaching profession. So a sample of (344) male and female student of the morning study of education colleges from the two universities of Baghdad and al Mustansria for the academic year 2012-2013.

So three tools had been used to achieve the procedures of the research which are: the scale of positive thinking constracted by Abdal satar Ibrahim year 2010, the scale of self academicmotivation constracted by (Gottfried) and adapted by Hanan Hussan year 2010, the scale of teaching profession trend constracted by Enayat Zaki year 1974.

And by using the statistical means of person

... Show More
View Publication Preview PDF
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Combined effect of fineness modulus and grading zones of fine aggregate on fresh properties and compressive strength of self compacted concrete
...Show More Authors

Self-compacted concrete (SCC) considered as a revolution progress in concrete technology due to its ability for flowing through forms, fusion with reinforcement, compact itself by its weight without using vibrators and economic advantages. This research aims to assess the fresh properties of SCC and study their effect on its compressive strength using different grading zones and different fineness modulus (F.M) of fine aggregate. The fineness modulus used in this study was (2.73, 2.82,2.9& 3.12) for different zones of grading (zone I, zone II& marginal zone(between zone I&II)) according to Iraqi standards (I.Q.S No.45/1984).Twelve mixes were prepared, each mix were tested in fresh state with slump, V-Funnel and L-Box tests, t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jun 21 2013
Journal Name
Journal Of Engineering
Combined effect of fineness modulus and grading zones of fine aggregate on fresh properties and compressive strength of self compacted concrete
...Show More Authors

Self-compacted concrete (SCC) considered as a revolution progress in concrete technology due to its ability for flowing through forms, fusion with reinforcement, compact itself by its weight without using vibrators and economic advantages. This research aims to assess the fresh properties of SCC and study their effect on its compressive strength using different grading zones and different fineness modulus (F.M) of fine aggregate. The fineness modulus used in this study was (2.73, 2.82,2.9& 3.12) for different zones of grading (zone I, zone II& marginal zone(between zone I&II)) according to Iraqi standards (I.Q.S No.45/1984).Twelve mixes were prepared, each mix were tested in fresh state with slump, V-Funnel and L-Box tests, then 72

... Show More
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
A New method for ISE construction for methyl orange dyes and using for indirect determination of Amitriptyline Hydrochloried drug
...Show More Authors

A new method for construction ion-selective electrode (ISE) by heating reaction of methyl orange with ammonium reineckate using PVC as plasticizer for determination methyl orange and determination Amitriptyline Hydrochloried drug by formation ion-pair on electrode surface . The characteristics of the electrode and it response as following : internal solution 10-4M , pH (2.5-5) ,temperature (20-30) and response time 2 sec. Calibration response for methyl orange over the concentrationrange 10-3 -10-9 M with R=0.9989 , RSD%=0.1052, D.O.L=0.315X10-9 MEre%=(-0.877- -2.76) , Rec%.=(97.230 -101.711) .

View Publication Preview PDF
Crossref
Publication Date
Sun Nov 02 2025
Journal Name
Al–bahith Al–a'alami
THE SEMIOTICS OF PROPAGANDA SPEECH IN SOCIAL MEDIA SITES (A Semiotic Study of the News Reports on the Israeli "Makan" Channel)
...Show More Authors

Technological and digital development has allowed the emergence of many methods of producing semantics on social media sites within semiotic and propagandistic frameworks. This is what made the image appear in different molds and shapes, especially as it is the first material for visual perception.
This made the Israeli propaganda discourse use it as an important tool to manage the content of suggestive messages with semiological connotations. By doing so, such tool uses social networking sites as an appropriate environment to achieve those goals, which are related to cases of manipulating emotions and minds. It, moreover, changes convictions, attitudes, trends and behaviors according to what the propaganda planner wants.
Many Isra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 27 2023
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Clinicopathological Features of Colorectal Cancer in the Iraqi Population Focusing on Age and Early-Onset of Malignancy: A Descriptive Cross-Sectional Study
...Show More Authors

Background: Colorectal cancer (CRC) is one of the top ten most common cancers worldwide. There are multiple risk factors for CRC, one of which is aging. However, in recent years, CRC has been reported in children. Objective: To describe the main characteristics and symptoms of CRC as well as highlight pathologic data for early-onset CRC. Methods: 79 CRC patients were recruited from the Oncology Teaching Hospital in the period February–December 2022. A questionnaire was used to collect demographic and clinical data. Results: 25 (31.6%) of patients were below 50 years of age. 52 (65.8%) patients had tumors in the colon. The most common symptom is bleeding per rectum in both age groups. There was no significant difference in patholog

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref