Voice Activity Detection (VAD) is considered as an important pre-processing step in speech processing systems such as speech enhancement, speech recognition, gender and age identification. VAD helps in reducing the time required to process speech data and to improve final system accuracy by focusing the work on the voiced part of the speech. An automatic technique for VAD using Fuzzy-Neuro technique (FN-AVAD) is presented in this paper. The aim of this work is to alleviate the problem of choosing the best threshold value in traditional VAD methods and achieves automaticity by combining fuzzy clustering and machine learning techniques. Four features are extracted from each speech segment, which are short term energy, zero-crossing rate, autocorrelation, and log energy. A modified version of fuzzy C-Means is then used to cluster speech segments into three clusters; two clusters for voice and one for unvoiced. After that, three feed forward neural networks are trained to adjust their weights, in which each network represents one cluster. To make the final decision regarding the class type of a given speech segment, the membership degrees of this segment in all clusters along with neural networks' decisions are given to a defuzzification step which finally gives the class type of that segment. The proposed FN-AVAD is tested on the public multimodal emotion database, Surrey AudioVisual Expressed Emotion (SAVEE), and the error rate was 2.08%. The achieved results are comparable to the results achieved by the current published works in the literature.
Spider veins are a common aesthetic problem mainly in females , the conventional method of treatment is by microsclerotherapy (injections) but laser therapy has become increasingly efficacious and a convenient method for treatment. The present study was performed to investigate the effectiveness and safety of pulsed diode laser (810nm) by doing thermal photocoagulation. Ten patients with lower limbs spider veins were included in this prospective study. They were treated with a repetitive pulsed diode laser in non contact technique using the following laser parameters (wave length 810nm,power 1 W ,pulse duration 0.1 s., pulse interval 0.5 s, spot diameter 4mm ,power density 7.9 W/cm2). Laser therapy was performed on day zero and day fourt
... Show MoreThe biochar prepared from sawdust raw material was applied in this study for the treatment of wastewater polluted with methyl orange dye. The effect of pH (2-11), initial concertation (50-250 mg/L) and time were studied. The isotherm of Langmuir, Frendluch and temkin models studied. The Langmuir model was the best to explain the adsorption process, maximum uptake was 136.67 mg/g at 25Co of methyl orange dye. Equilibrium reached after four hours of contact for most adsorbents.The values of thermodynamic parameters ∆G were negative at various temperatures, so the process spontaneous, while ∆H values were 16683 j/mol and ∆S values was 60.82 j/mol.k.
In the field of construction project management, time and cost are the most important factors to be considered in planning every project, and their relationship is complex. The total cost for each project is the sum of the direct and indirect cost. Direct cost commonly represents labor, materials, equipment, etc.
Indirect cost generally represents overhead cost such as supervision, administration, consultants, and interests. Direct cost grows at an increasing rate as the project time is reduced from its original planned time. However, indirect cost continues for the life of the project and any reduction in project time means a reduction in indirect cost. Therefore, there is a trade-off between the time and cost for completing construc
To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show MoreThis paper presents the results of experimental investigations to predict the bearing capacity of square footing on geogrid-reinforced loose sand by performing model tests. The effects of several parameters were studied in order to study the general behavior of improving the soil by using the geogrid. These parameters include the eccentricity value, depth of first layer of reinforcement, and vertical spacing of reinforcement layers. The results of the experimental work indicated that there was an optimum reinforcement embedment depth at which the bearing capacity was the highest when single-layer reinforcement was used. The increase of (z/B) (vertical spacing of reinforcement layer/width of footing) above 1.5 has no effect on the re
... Show MoreThere are several oil reservoirs that had severe from a sudden or gradual decline in their production due to asphaltene precipitation inside these reservoirs. Asphaltene deposition inside oil reservoirs causes damage for permeability and skin factor, wettability alteration of a reservoir, greater drawdown pressure. These adverse changing lead to flow rate reduction, so the economic profit will drop. The aim of this study is using local solvents: reformate, heavy-naphtha and binary of them for dissolving precipitated asphaltene inside the oil reservoir. Three samples of the sand pack had been prepared and mixed with a certain amount of asphaltene. Permeability of these samples calculated before and after mixed with asphaltenes. Then, the
... Show MoreIn this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.
Study of group action of stone columns using FEM