Recognizing speech emotions is an important subject in pattern recognition. This work is about studying the effect of extracting the minimum possible number of features on the speech emotion recognition (SER) system. In this paper, three experiments performed to reach the best way that gives good accuracy. The first one extracting only three features: zero crossing rate (ZCR), mean, and standard deviation (SD) from emotional speech samples, the second one extracting only the first 12 Mel frequency cepstral coefficient (MFCC) features, and the last experiment applying feature fusion between the mentioned features. In all experiments, the features are classified using five types of classification techniques, which are the Random Forest (RF),
... Show MoreThe traditional technique of generating MPSK signals is basically to use IQ modulator that involves analog processing like multiplication and addition where inaccuracies may exist and would lead to imbalance problems that affects the output modulated signal and hence the overall performance of the system. In this paper, a simple method is presented for generating the MPSK using logic circuits that basically generated M-carrier signals each carrier of different equally spaced phase shift. Then these carriers are time multiplexed, according to the data symbols, into the output modulated signal.
Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation. Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota
... Show MoreIn this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreSteganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show MoreScientific development has occupied a prominent place in the field of diagnosis, far from traditional procedures. Scientific progress and the development of cities have imposed diseases that have spread due to this development, perhaps the most prominent of which is diabetes for accurate diagnosis without examining blood samples and using image analysis by comparing two images of the affected person for no less than a period. Less than ten years ago they used artificial intelligence programs to analyze and prove the validity of this study by collecting samples of infected people and healthy people using one of the Python program libraries, which is (Open-CV) specialized in measuring changes to the human face, through which we can infer the
... Show Moreمن الاهمية دراسة التاريخ كونه يمدنا بحلول للمشكلات المعاصرة في ضوء خبرات الماضي، ودراسة سلبيات وايجابيات هذه الحلول، وانطلاقا من مبدأ أن ذوي الإعاقة البصرية طاقة بشرية لابد من استثمارها بما يخدم تقدم وازدهار المجتمع، فمن الأهمية تسليط الضوء على هذه الفئة والإسهام بنقل صورة مشرفة عنها، قد تكون دافعا للآخرين ممن اوقفهم انطفاء شعاع النور والبصيرة عن اكمال حياتهم لشرارة امل تعيد لهم شغفهم في الحياة، وته
... Show MoreThe research aims to reveal the availability of skills to develop the tax assessor when carrying out the tax examination process. The study was conducted in the branches of the General Tax Authority in the province of Baghdad (the General Authority for Taxes, Adhamiya branch, the General Authority for Taxes, Rusafa branch, Al-Bayaa branch, New Baghdad tax branch) was approved The descriptive approach to achieve the research objectives represented by answering the following two questions: 1- What are the necessary skills that should be available in the performance of the tax examiner? 2- Are the skills of developing a tax evaluator available? The two researchers used the closed questionnaire as a tool for their research. The quest
... Show More