Speech recognition is a very important field that can be used in many applications such as controlling to protect area, banking, transaction over telephone network database access service, voice email, investigations, House controlling and management ... etc. Speech recognition systems can be used in two modes: to identify a particular person or to verify a person’s claimed identity. The family speaker recognition is a modern field in the speaker recognition. Many family speakers have similarity in the characteristics and hard to identify between them. Today, the scope of speech recognition is limited to speech collected from cooperative users in real world office environments and without adverse microphone or channel impairments.
Three-dimensional (3D) image and medical image processing, which are considered big data analysis, have attracted significant attention during the last few years. To this end, efficient 3D object recognition techniques could be beneficial to such image and medical image processing. However, to date, most of the proposed methods for 3D object recognition experience major challenges in terms of high computational complexity. This is attributed to the fact that the computational complexity and execution time are increased when the dimensions of the object are increased, which is the case in 3D object recognition. Therefore, finding an efficient method for obtaining high recognition accuracy with low computational complexity is essentia
... Show MoreThis study has been developed axes of the search, including: Search (deliberative) language and idiomatically, and Description Language (b social phenomenon), and the definition of the theory of (acts of speech), and discussed the problem of the conflict between tradition and innovation, as defined objectively have a target aimed at reviving the deliberative thought when Arab scholars , and the balance between the actual done Arab and Western rhetoric, but Meet in intellectual necessity, a sober reading that preserve the Arab language prestige, and its position in the light of the growing tongue Sciences, as long as we have inherited minds unique, and heritage huge able to consolidate the Arab theory lingual in linguistics.
Abstract
For sparse system identification,recent suggested algorithms are
-norm Least Mean Square (
-LMS), Zero-Attracting LMS (ZA-LMS), Reweighted Zero-Attracting LMS (RZA-LMS), and p-norm LMS (p-LMS) algorithms, that have modified the cost function of the conventional LMS algorithm by adding a constraint of coefficients sparsity. And so, the proposed algorithms are named
-ZA-LMS,
The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im
... Show MoreVirtual organization is similar to traditional organization in principles, but is different in the ways it operates. It requires small creation costs compared to the traditional and it uses electronic commerce as the market place and distribution channel for its products and services.The aim of this article is to applying electronic commerce for a proposed virtual organization. The tools used to build an effective web application for virtual organization to provide virtual environment to the customers to do the transaction activities online include PHP, MySQL and Apache. HTML is used for displaying forms and tables and JavaScript is used for verification in client side. Finally, connecting it to 2Checkout.com company as a third party to per
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreThe present study aims to isolate and identify ectoparasites, specifically hard ticks, that infest both domestic and wild rabbits. This research is motivated by the heightened sensitivity of rabbits to infestations by hard ticks, which are recognized as the primary vectors of certain blood-borne diseases, particularly Viral Hemorrhagic Fever (VHF). The study areas were spread across five provinces in Iraq: Baghdad, Karbala, Wasit, Mosul, and Al-Anbar. A total of 85 hard ticks (42 male and 43 female) were infested by 57 rabbits (Leporidae Family), including 19 wild rabbits (hare) with an infestation rate of 100% and 38 domestic rabbits with an infestation rate of 18.42%. Total of infestation was 45.61%. The current results are the oc
... Show MoreThe recent research aims to the following
1- Identify the for Psychicasthein high school students
2-Identify the differences of Psychicasthein of high school students according tothe (male, female).
3- Identify the for Family Violence high school students .
4-Identify the differences of Family Violence of high school students according to the ( male,female)
5-Identify of the relationship between the Psychicasthein and family violence
To achieve the objectives of the present research was to build Psychicasthein scale and the adoption of a measure of domestic violence, and applied these tools, and after extracting the psychometric properties of the two measures of reliability and validity, according to a sample of 200 stu
The Lamiaceae L. family grows and widely distributed in Iraq. The study aimed to enumerate the species that has been preserved in several botanical herbariums: National Herbarium of Iraq- Ministry of Agriculture (BAG), University of Baghdad Herbarium (BUH), Iraq Natural History Research Center& Museum- University of Baghdad Herbarium (BUNH), College of Agricultural Engineering- University of Baghdad Herbarium (BUG), College of Agricultural Engineering Sciences- Duhok Province University Herbarium (DPUH) and College of Science - Salahddin University Herbarium (SUH). This family has not yet been registered in the Flora of Iraq. After examining more than 1000 herbarium specimens, the study found 139 species belonging to 33 genera h
... Show MoreThis study was conducted to examine the anatomical aspects of