Preferred Language
Articles
/
ChZUZYoBVTCNdQwCdJ3M
Hybrid Techniques based Speech Recognition
...Show More Authors

Information processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (Ecl) distance match performance is (62%) in MWM. So, in speech recognition to get the high alignment and high performance one must use DTW distance measurement.

Crossref
View Publication
Publication Date
Thu Oct 01 2020
Journal Name
Pakistan Journal Of Medical And Health Sciences
Relation of red cell width diameter with some electrophysiological parameters of symptomatic sinus node patients in Iraq(Article)
...Show More Authors

Background: Dysfunction of sinoatrial node is a set of abnormal rhythms which are resulted from the sinoatrial node malfunctionof the sinus node, the chief natural cardiac pacemaker. The common, and occasionally, the single method for treatment of heart arrhythmias wasimplantation of pacemaker, which reduce symptoms exactly occurs after implantation. Aim: To detect the association between red cell width diameter (RDW) and some cardiac electrophysiology parameters in sinus node dysfunction in Iraqi patients such as SNRT and AH. Methods: A cross sectional study, was conducted on 59 patient ranging between 20-50 years old and involving 35 female and 24 male patients, suffering from an unexplained symptoms of sinoatrial node dysfunction (SND).

... Show More
View Publication
Publication Date
Sun Jul 01 2018
Journal Name
The Iraqi Postgraduate Medical Journal
Molecular and Serologic Detection of HLA-B27 among Ankylosing Spondylitis Patients with Some Clinical Correlations
...Show More Authors

BACKGROUND: HLA-B27 can effect clinical presentation and course of ankylosing spondylitis. Different detection techniques of HLA-B27 are available with variable sensitivities and specificities. OBJECTIVE: To compare serologic and molecular diagnostic techniques of detecting HLA-B27 status and to correlate it with some clinical variables among ankylosing spondylitis patients. PATIENTS AND METHODS: A cross-sectional study was conducted on 83 Iraqi patients with ankylosing spondylitis. Clinical and laboratory evaluations were reported. HLA-B27 status was determined in all patients by real-time PCR using HLA-B27 RealFast™ kit; ELISA method was used as well to detect soluble serum HLA-B27 antigens using Human Leukocyte Antigen® kit. RESULTS:

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 01 2025
Journal Name
Ieee
Securing Power Microgrids: A Cyber-Physical Approach for Modern Infrastructure
...Show More Authors

With the increasing reliance on microgrids as flexible and sustainable solutions for energy distribution, securing decentralized electricity grids requires robust cybersecurity strategies tailored to microgrid-specific vulnerabilities. The research paper focuses on enhancing detection capabilities and response times in the face of coordinated cyber threats in microgrid systems by implementing advanced technologies, thereby supporting decentralized operations while maintaining robust system performance in the presence of attacks. It utilizes advanced power engineering techniques to strengthen cybersecurity in modern power grids. A real-world CPS testbed was utilized to simulate the smart grid environment and analyze the impact of cyberattack

... Show More
Publication Date
Mon Jul 10 2023
Journal Name
Journal Of Engineering
Theoretical Evaluation of Solar Assisted Desiccant Cooling System for a Small Meeting-Hall
...Show More Authors

The performance of a solar assisted desiccant cooling system for a meeting-hall located in the College of Engineering/University of Baghdad was evaluated theoretically. The system was composed of four components; a solar air heater, a desiccant dehumidifier, a heat exchanger and an evaporative cooler. A computer simulation was developed by using MATLAB to assess the effect of various design and operating conditions on the performance of the system and its components. The actual weather data on recommended days were used to assess the load variation and the system performance during those days. The radiant time series method (RTS) was used to evaluate the hourly variation of the cooling load. Four operation modes were employed for perform

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 03 2025
Journal Name
International Journal Of Economics And Finance Studies
BEHAVIOUR OF THE DISCRETIONARY ACCRUALS IN TIME: EMPIRICAL STUDY IN THE AMERICAN FIRMS FOOD
...Show More Authors

The main aim of this research study is to point out the vital importance of high-quality exterior audits to limit discretionary accounting, as it could distort a company’s commercial results. The research introduces a well-founded hypothesis on the preventive powers of high-quality audits, as it can act as a strong exterior control. The research focuses on testing the complex relationship between earnings management and investors’ behavior within the public-listed companies from the food industry. The research gathers credible annual comprehensive data from thirty-five publicly-listed firms from the United States. It encompasses the twenty years prior to 2024, as it includes the twenty years prior to 2024. Additionally, the gathered dat

... Show More
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
DEO: A Dynamic Event Order Strategy for t-way Sequence Covering Array Test Data Generation
...Show More Authors

Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of cove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Jan 05 2019
Journal Name
Iraqi Journal Of Physics
Functionalization of single and multi-walled carbon nanotubes by chemical treatment
...Show More Authors

In this work we experimentally investigated SWCNTs and MWCNTs to increase their thermal conductivity and electrically functionalization process using different reagents ((nitric acid, HNO3 followed by acid treatment with H2SO4), then washed with deionized water (DW) and then treated with H2O2 via ultrasonic technique. Then repeated the steps with MWCNTs and compare their results in an effort to improve experimental conditions that efficiently differentiate the surface of the single walled carbon nanotubes (SWCNTs) and multi walled carbon nanotubesi(MWCNTs) that less nanotubes destroy and to enhance the properties of them and also to reduce aggregation in liquid. the results were prove by XRD, and infrared spectroscopy (FTIR). The FTIR sp

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
Reliability Analysis of Multibit Error Correcting Coding and Comparison to Hamming Product Code for On-Chip Interconnect
...Show More Authors

Error control schemes became a necessity in network-on-chip (NoC) to improve reliability as the on-chip interconnect errors increase with the continuous shrinking of geometry. Accordingly, many researchers are trying to present multi-bit error correction coding schemes that perform a high error correction capability with the simplest design possible to minimize area and power consumption. A recent work, Multi-bit Error Correcting Coding with Reduced Link Bandwidth (MECCRLB), showed a huge reduction in area and power consumption compared to a well-known scheme, namely, Hamming product code (HPC) with Type-II HARQ. Moreover, the authors showed that the proposed scheme can correct 11 random errors which is considered a high

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 03 2026
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 04 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced IOT Cyber-Attack Detection Using Grey Wolf Optimized Feature Selection and Adaptive SMOTE
...Show More Authors

The Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats.  This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat

... Show More
View Publication Preview PDF
Scopus Crossref