In this work , a hybrid scheme tor Arabic speech for the recognition
of the speaker verification is presented . The scheme is hybrid as utilizes the traditional digi tal signal processi ng and neural network . Kohonen neural network has been used as a recognizer tor speaker verification after extract spectral features from an acoustic signal by Fast Fourier Transformation Algorithm(FFT) .
The system was im plemented using a PENTIUM processor , I000
MHZ compatible and MS-dos 6.2 .
Boltzmann mach ine neural network bas been used to recognize the Arabic speech. Fast Fourier transl(>lmation algorithm has been used t() extract speciral 'features from an a caustic signal .
The spectral feature size is reduced by series of operations in
order to make it salable as input for a neural network which is used as a recogni zer by Boltzmann Machine Neural network which has been used as a recognizer for phonemes . A training set consist of a number of Arabic phoneme repesentations, is used to train lhe neuntl network.
The neural network recognized Arabic. After Boltzmann Machine Neura l network training the system with
... Show MoreThe focus of this article, reviewed a generalized of contraction mapping and nonexpansive maps and recall some theorems about the existence and uniqueness of common fixed point and coincidence fixed-point for such maps under some conditions. Moreover, some schemes of different types as one-step schemes ,two-step schemes and three step schemes (Mann scheme algorithm, Ishukawa scheme algorithm, noor scheme algorithm, .scheme algorithm, scheme algorithm Modified scheme algorithm arahan scheme algorithm and others. The convergence of these schemes has been studied .On the other hands, We also reviewed the convergence, valence and stability theories of different types of near-plots in convex metric space.
Linguistic research according to modern curricula:
It is one of the important matters that occupy the ideas of those concerned with linguistic studies, whether Arabic or otherwise. Recent years have witnessed the advancement of this methodological approach, and books and studies in Arabic have been written on important, multifaceted issues, of grammatical and linguistic origins, and their balance with new developments and ideas attracted mostly from Western studies.
The comparative approach - as they call it - is one of the modern approaches that is based on balancing a language with other sisters belonging to its family, to reach similarities and differences between them, and to know the c
Basketball is a popular game in many parts of the world and many developed countries are making continuous efforts to prepare and develop their emerging players on scientific and clear bases as the basis for reaching high levels The researchers used the descriptive approach in the method of correlative studies to suit the nature of the study The readymade software (IBM SPSS Statistics Version24) was used to perform statistical treatments The researchers concluded that there was a significant relationship between body size indicators (height and weight) with the fitness elements of the emerging basketball players The researchers recommended conducting a similar study to determine the type of relationship to the indicators of the physical str
... Show MoreBackground: The aim of this study is to evaluate the color change ∆E of the dental enamel following treatment with 2 kinds of protector (icon infiltrant, clinpro varnish) before fixed orthodontic treatment to avoid the possible white spot lesions. Materials and Methods: Fifty four subjects treated with fixed appliances were divided into 3 groups: the 1st group was control, while the 2nd and 3rd groups were treated with icon infiltrant and clinpro varnish before bonding procedure, respectively. Color parameters (L,a,b) were recorded for the middle and gingival thirds before and after bonding procedure to get the ∆E of each group. Results: One-way ANOVA test showed a non-significant difference in ∆E between the 3 groups a
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show More