Recent advances in wireless communication systems have made use of OFDM technique to achieve high data rate transmission. The sensitivity to frequency offset between the carrier frequencies of the transmitter and the receiver is one of the major problems in OFDM systems. This frequency offset introduces inter-carrier interference in the OFDM symbol and then the BER performance reduced. In this paper a Multi-Orthogonal-Band MOB-OFDM system based on the Discrete Hartley Transform (DHT) is proposed to improve the BER performance. The OFDM spectrum is divided into equal sub-bands and the data is divided between these bands to form a local OFDM symbol in each sub-band using DHT. The global OFDM symbol is formed from all sub-bands together using the (IDHT). The BER performance of the proposed system is simulated and compared with the conventional OFDM in different channel conditions to show the gain in SNR achieved by the proposed system.
The current research seeks to identify mono-multi Vision and its relation to the psychological rebellion and personality traits of university students. To achieve this aim, the researcher has followed all the procedures of the descriptive correlational approach, as it is the closest approach to the objectives of the current research. The researcher has determined his research community for Baghdad University students for the academic year 2019-2020. As for the research sample, it was chosen by the random stratified method with a sample of (500) male and female students. In order to collect data from the research sample, the researcher adopted a mono-multi-dimensional scale
(Othman, 2007), the researcher designed a psychological r
... Show MoreMulti-nationalities companies are the main companies in the progressed
countries that improve the current technology and, thus, become the main source of it.
These companies, in the first place, aim to increase the profits of its
investments to satisfy stock holders in the original countries to which these companies
belong.
It is a mean to interfere in the economic of countries especially the growing
ones and exploit their important natural resources. Since this research focus on the
dangers of these companies, mechanism of its work and its dangers on the most
important natural resources of our country which is oil; therefore, the research
confirm that this important natural treasure must be under an Iraqi cont
Baker's Yeast is an important additive among the substances, which improves bred quality, thus, a consideration has been made to study the conditions and parameters that affecting the production of the yeast in a batch fermenter experimentally and theoretically. Experimental runs were implemented in a 12-liter pilot-scale fermenter to predict the rate of growth and other parameters such as amount of additive consumed and the amount of heat generated. The process is modeled and performed using a computer programming prepped for this purpose, the model gave a good agreement comparing to the experimental work specially in the log phase.
In this work dithine complexes prepared from dithiol benzil ligand and central ion to the Ni,Pd,Pt, element the ligand and complexes have been investigated using FTIR spectrophotometer and uv-vis-NIR spectral reigns show higher intensity represents the ?-?* transition in the chromopher cycle .These absorption which appear in visible and near IR spectral regions ,According to the complexes of one group ,the spectral shifting due to the change of central ion has been found to be related to atomic number of central ion .This shifting is increased while decreasing the central ion atom number These complexes have been implemented in Nd+2:YAG cavity because each posses resonant absorption band near Nd+2:YAG, Nd+2:Glass emitting at (106
... Show MoreThe splicing design of the existing road and the new road in the expansion project is an important part of the design work. Based on the analysis of the characteristics and the load effect of pavement structure on splicing, this paper points out that tensile crack or shear failure may occur at the splicing under the repeated action of the traffic load on the new/old pavement. According to the current structure design code of asphalt pavement in China, it is proposed that the horizontal tensile stress at the bottom of the splicing layer and the vertical shear stress at other layers of the splicing line should be controlled by adjusting the position and size of the excavated steps in addition to the conventional design ind
... Show MoreDifferent methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard versi
... Show MoreThis paper describes a new proposed structure of the Proportional Integral Derivative (PID) controller based on modified Elman neural network for the DC-DC buck converter system which is used in battery operation of the portable devices. The Dolphin Echolocation Optimization (DEO) algorithm is considered as a perfect on-line tuning technique therefore, it was used for tuning and obtaining the parameters of the modified Elman neural-PID controller to avoid the local minimum problem during learning the proposed controller. Simulation results show that the best weight parameters of the proposed controller, which are taken from the DEO, lead to find the best action and unsaturated state that will stabilize the Buck converter system performan
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreIn this paper, we investigate and characterize the effects of multi-channel and rendezvous protocols on the connectivity of dynamic spectrum access networks using percolation theory. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from a phenomenon which we define as channel abundance. To cope with the existence of multi-channel, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocols, it becomes difficult for two nodes to agree on a common channel, thereby, potentially remaining invisible to each other. We model this in
... Show More