Beyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attention-based convolutional neural network (CNN) model. To address age ambiguity, we evaluate the effects of different loss functions such as focal loss and Kullback-Leibler (KL) divergence loss. Additionally, we evaluate the accuracy of the estimation at different durations of speech. Experimental results from the Common Voice dataset underscore the efficacy of our approach, showcasing an accuracy of 87% for male speakers, 91% for female speakers and 89% overall accuracy, and an accuracy of 99.1% for gender prediction.
Nowadays, the mobile communication networks have become a consistent part of our everyday life by transforming huge amount of data through communicating devices, that leads to new challenges. According to the Cisco Networking Index, more than 29.3 billion networked devices will be connected to the network during the year 2023. It is obvious that the existing infrastructures in current networks will not be able to support all the generated data due to the bandwidth limits, processing and transmission overhead. To cope with these issues, future mobile communication networks must achieve high requirements to reduce the amount of transferred data, decrease latency and computation costs. One of the essential challenging tasks in this subject
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreThe introduction and importance of the research included that physical education and its various activities are important for the disabled. The exercise of physical activities by the disabled effectively contributes to raising their level of fitness and reducing diseases caused by lack of movement. Disabled people often suffer from psychological and social problems, and this feeling may be accompanied by a high level of anxiety, a lack of self-esteem and a loss of self-confidence. Psychological adaptation is one of the concepts of sports psychology interconnected with the psychological climate, as the process that the player seeks to meet his demands and needs. Adaptation includes the pursuit of emotional balance between the individual play
... Show MoreThe research aims to reveal the professional self and the school climate among the educational counselors. The research problem is crystallized in the following:
1-Identifying the professional level of the educational counselors.
2- Knowing the level of the school climate with the educational counselors.
3- Are there statistically significant differences in the professional self and the school climate between the educational counselors of different gender (male / female)?
4- Is there a relationship between the professional self and the school climate of the research sample?
To answer these questions, the research was conducted on educational counselors in secondary schools in the district of Falluj
... Show MoreTransparent nano- coating was prepared by Sol-Gel method from titanium dioxide TiO2 which has the ability to self-cleaning coating used for hospitals, laboratories, and places requiring permanent sterilization. Three primary colors are selected (red, blue, and yellow) as preliminary study to the effect of these colors on the nano-coating. Three traditional oil paints color were used as base, then coated by a layer of TiO2-Sol and deposited on the paints. The optical properties of TiO2-Sol were measured; the maximum absorption wavelength at (λmax=387 nm), the refractive index (n=1.4423) and the energy band gap (Eg=3.2 eV). The structure properties found by X-ray diffraction of TiO
Background: The main purpose of this study is to find if there is any correlation between the level of C-reactive protein (CRP) in gingival crevicular fluid with its serum level in chronic periodontitis patients and to explore the differences between them according to the probing depth. Materials and methods: Forty seven male subjects enrolled in this study. Thirty males with chronic periodontitis considered as study group whom further subdivided according to probing depth into subgroup 1 with pocket depth ≤6mm, subgroup 2 with pocket depth >6mm. The other 17 subjects considered as controls. For all subjects, clinical examination where done for periodontal parameters plaque index (PLI), gingival index (GI), bleeding on probing (BOP),
... Show MoreThe development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in
... Show MoreConstructal theory plays a major role in the conceptual design stage of the structural system in architecture. It provides a conceptual framework for predicting the form depending on natural systems to model those systems geometrically according to the constructal law that works in two directions: the first is towards predicting the general form of the structural system, and the second is the physical application of the law in the process of detailed design of the parts of the system. The aim of this paper is to determine the mechanism adopted in the structural design according to the constructal theory, assuming that the structural design according to the constructal theory achieves