One study whose importance has significantly grown in recent years is lip-reading, particularly with the widespread of using deep learning techniques. Lip reading is essential for speech recognition in noisy environments or for those with hearing impairments. It refers to recognizing spoken sentences using visual information acquired from lip movements. Also, the lip area, especially for males, suffers from several problems, such as the mouth area containing the mustache and beard, which may cover the lip area. This paper proposes an automatic lip-reading system to recognize and classify short English sentences spoken by speakers using deep learning networks. The input video extracts frames and each frame is passed to the Viola-Jones to detect the face area. Then 68 landmarks of the facial area are determined, and the landmarks from 48 to 68 represent the lip area extracted based on building a binary mask. Then, the contrast is enhanced to improve the quality of the lip image by applying contrast adjustment. Finally, sentences are classified using two deep learning models, the first is AlexNet, and the second is VGG-16 Net. The database consists of 39 participants (32 males and 7 females). Each participant repeats the short sentences five times. The outcomes demonstrate the accuracy rate of AlexNet is 90.00%, whereas the accuracy rate for VGG-16 Net is 82.34%. We concluded that AlexNet performs better for classifying short sentences than VGG-16 Net.
Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
In this paper, an approximate solution of nonlinear two points boundary variational problem is presented. Boubaker polynomials have been utilized to reduce these problems into quadratic programming problem. The convergence of this polynomial has been verified; also different numerical examples were given to show the applicability and validity of this method.
The importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process
... Show MoreThe present work describes numerical and experimental investigation of the heat transfer characteristics in a plate-fin, having built-in piezoelectric actuator mounted on the base plate (substrate). The geometrical configuration considered in the present work is representative of a single element of the plate-fin and triple fins. Air is taken as the working fluid. A performance data for a single rectangular fin and triple fins are provided for different frequency levels (5, 30 and
50HZ) , different input power (5,10,20,30,40 and 50W) and different inlet velocity (0.5, 1, 2, 3, 4, 5 and 6m/s) for the single rectangular fin and triple fins with and without oscillation. The investigation was also performed with different geometrical fin
Abstract
This study aims to evaluated the user satisfaction of retrieval services
concerning to universities thesis and dissertations in university dissertation
unit of Baghdad Library for achieving the following objectives:
1- Evaluating the performance of this unit (thesis unit of Baghdad University
Library) regarding to users opinion.
2- Recognizing the reasons in this unit behind the case of non satisfaction of
its users and trying to find the suitable solutions.
To achieve those two objectives, the questionnaire tool was performed
and determined the user's satisfaction level by using a sample survey. 1118
graduated students were subjected to this experiment. The following main
results were appeared:<
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThe aim of this study is to compare the effects of three methods: problem-based learning (PBL), PBL with lecture method, and conventional teaching on self-directed learning skills among physics undergraduates. The actual sample size comprises of 122 students, who were selected randomly from the Physics Department, College of Education in Iraq. In this study, the pre- and post-test were done and the instruments were administered to the students for data collection. The data was analyzed and statistical results rejected null hypothesis of this study. This study revealed that there are no signifigant differences between PBL and PBL with lecture method, thus the PBL without or with lecture method enhances the self-directed learning skills bette
... Show MoreAbstract
The study aims to examine the relationships between cognitive absorption and E-Learning readiness in the preparatory stage. The study sample consisted of (190) students who were chosen randomly. The Researcher has developed the cognitive absorption and E-Learning readiness scales. A correlational descriptive approach was adopted. The research revealed that there is a positive statistical relationship between cognitive absorption and eLearning readiness.
The exchanges in various fields,like economics, science, culture, etc., have been enhanced unceasingly among different countries around the world in the twenty-first century, thus, the university graduate who masters one foreign language does not meet the need of the labor market in most countries.So, many universities began to develop new programs to cultivate students who can use more foreign languages to serve the intercultural communication. At the same time, there is more scientific research emerged which is related to the relationship between the second and third languages. This humble research seeks to explain the relevant concepts and analyze the real data collected from Shanghai International Studies University in China, to expl
... Show More