Massive multiple-input multiple-output (m-MIMO) is considered as an essential technique to meet the high data rate requirements of future sixth generation (6G) wireless communications networks. The vast majority of m-MIMO research has assumed that the channels are uncorrelated. However, this assumption seems highly idealistic. Therefore, this study investigates the m-MIMO performance when the channels are correlated and the base station employs different antenna array topologies, namely the uniform linear array (ULA) and uniform rectangular array (URA). In addition, this study develops analyses of the mean square error (MSE) and the regularized zero-forcing (RZF) precoder under imperfect channel state information (CSI) and a realistic physical channel model. To this end, the MSE minimization and the spectral efficiency (SE) maximization are investigated. The results show that the SE is significantly degraded using the URA topology even when the RZF precoder is used. This is because the level of interference is significantly increased in the highly correlated channels even though the MSE is considerably minimized. This implies that using a URA topology with relatively high channel correlations would not be beneficial to the SE unless an interference management scheme is exploited.
There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (
... Show MoreMassive multiple-input multiple-output (massive-MIMO) is a promising technology for next generation wireless communications systems due to its capability to increase the data rate and meet the enormous ongoing data traffic explosion. However, in non-reciprocal channels, such as those encountered in frequency division duplex (FDD) systems, channel state information (CSI) estimation using downlink (DL) training sequence is to date very challenging issue, especially when the channel exhibits a shorter coherence time. In particular, the availability of sufficiently accurate CSI at the base transceiver station (BTS) allows an efficient precoding design in the DL transmission to be achieved, and thus, reliable communication systems can be obtaine
... Show MoreThis paper examined accounting information systems (AIS) as a mediator between small and medium-sized enterprises (SMEs) strategies, including (finance source, administrative innovation, organizational culture, developing capabilities levels of SMEs, information source, development of business managers, and technological innovation) and organizational performance. In this quantitative study, 450 self-administered questionnaires were distributed to the managers and owners of SMEs using purposive sampling. Data were analyzed using the structural equation modeling (SEM) method via SmartPLS3 Software. The study offers empirical findings on the importance of AIS as a mediator, considers various factors, a
There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreThe aim of the research to measure the correlation relationship between modern manufacturing systems and process design and measure the effect by adopting the regression; the research consists of two main variables, which are modern manufacturing systems and process design; it was applied in the production lines of the General Company for Construction Industries, There is a sample of managers, engineers, technicians, administrators, and some workers were selected to fill the special questionnaire with (70) forms which distributed and (65) were approved suitable for use, For data analysis the correlation coefficient was adopted to measure the relationship and regression analysis to find out the effect, Using (SPSS), So the first h
... Show MoreThe research aims to test the impact of servant leadership in management information systems, as well as to identify the level of servant leadership practice and management information systems in the Directorate of Communications and Information Systems in the Iraqi Ministry of Interior, in terms of the importance of the research variables to the directorate and the sample community, as the research adopted the exploratory analytical descriptive approach In his achievement, through a survey of the opinions of an intended quota sample of (266) individuals, By adopting the questionnaire as a main tool for data collection that includes (44) items divided into the two research variables, As well as conducting open interviews to identify the pro
... Show MoreThe objective of this study is to enable the role of modern and advanced computerized information systems. The model or mechanism should be developed by collecting the necessary information about the taxpayers and the sources of the taxpayers' income, on the basis of which the accuracy of the inventory process will be adopted. In addition to studies related to computerized information systems and showing their importance to the tax institution. To achieve the objectives of the study and to answer its questions, the researcher relied on collecting data and information on the subject on the literature and previous studies The secondary sources, which also formed the theoretical framework of the study, were obtained either as a practical fr
... Show More