Beyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attention-based convolutional neural network (CNN) model. To address age ambiguity, we evaluate the effects of different loss functions such as focal loss and Kullback-Leibler (KL) divergence loss. Additionally, we evaluate the accuracy of the estimation at different durations of speech. Experimental results from the Common Voice dataset underscore the efficacy of our approach, showcasing an accuracy of 87% for male speakers, 91% for female speakers and 89% overall accuracy, and an accuracy of 99.1% for gender prediction.
The study aims to test the relationship of work pressure to its dimensions (role conflict, ambiguity of role, workload and nature of work) as an independent variable and its effect on organizational alienation by its dimensions (disability, lack of power, indifference, animosity, social isolation and self-alienation) (Restraint and confidence in negation, initiative, adaptation and living conscience) as a mediator variable, in some faculties of Baghdad University of Science (Medicine and Engineering) and Humanity (Education and Literature). The data was collected on the practical side, which was applied randomly (306) of the teachers and teachers of the colleges (56) items, which included the main research variables
... Show MoreThe self-awareness interactions reflects with emotions,assess the child in respect to its relations with the social standards; they are not merely simply reactions , but rather they connect with his moral behavior and other 's thinks. When the self- awareness gets developed with emotions within the child , the latter become highly sensitive, causing him prone to be blamed . AS a result , the children test the self –awareness interactions with emotions and in age 3 years , where the self –awareness interactions with emotion clearly link to the self- assessment. The children in stage of kindergarten could not describe the self-awareness interactions accurately ; they test it under different circumstances in comparison to the youngest o
... Show MoreIn this work, ZnO quantum dots (Q.dots) and nanorods were prepared. ZnO quantum dots were prepared by self-assembly method of zinc acetate solution with KOH solution, while ZnO nanorods were prepared by hydrothermal method of zinc nitrate hexahydrate Zn (NO3)2.6H2O with hexamethy lenetetramin (HMT) C6H12N4. The optical , structural and spectroscopic properties of the product quantum dot were studied. The results show the dependence of the optical properties on the crystal dimension and the formation of the trap states in the energy band gap. The deep levels emission was studied for n-ZnO and p-ZnO. The preparation ZnO nanorods show semiconductor behavior of p-type, which is a difficult process by doping because native defects.
Background: Self-medication is a practice or action taken by individuals for themselves in order to achieve and maintain health, as well as to avoid and protect against disease. The aim of this study is to evaluate the knowledge, attitudes, and practice of self-medication among medical students at Sudan International University.
Subjects & Methods: This was a prospective study that involved 288 out of 1000 students in the Faculty of Medicine at Sudan International University. Data were collected using a self-administered questionnaire from January to March 2022 to evaluate the self-medication knowledge, attitude, and practice among first, second, and third-ye
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreLeishmania species are the causative agent of a tropical disease known as leishmaniasis. Previous studies on the old world species Leishmania major, showed that the amastigotes form which resides inside the macrophage of the vertebrate host, utilize host’s sphingolipids for survival and proliferation. In this study, gene expression of serine palmitoyltransferase (SPT) subunit two (MmLCB2) of the mouse macrophage cell line (RAW264.7), which is the first enzyme in the de novo sphingolipid biosynthesis, was detected in both infected and non-infected macrophages. This was detected under condition where available sphingolipid was reduced, with the new world species Leishmania mexicana. Results of qPCR analysis showed that there was no differen
... Show MoreAim: To evaluation the effect of Lactobacillus acidophilus on Enterohemorrhagic Escherichia coli (EHEC) serotype O157:H7 with detection of some virulence factors. Methods: Two hundred and fifty specimens (stool) from children under five years for both sexes were collected from some hospitals. All isolates were diagnosed according to morphological characteristics, biochemical tests. Monoplex pattern of PCR was used also for detection different genes in (7) Escherichia coli )O157:H7 (isolates; include 16SrRNA, eae, lifA, Stx1,Stx2 that encoded for ribosomal RNA, intimin, lymphocyte inhibitory factor, shiga toxins. Three types of probiotics strains were obtained, Lactobacillus fermentum, Lactobacillus plantarum and Lactobacillus acidophilus (A
... Show MoreHome New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet tr
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More