In order to select the optimal tracking of fast time variation of multipath fast time variation Rayleigh fading channel, this paper focuses on the recursive least-squares (RLS) and Extended recursive least-squares (E-RLS) algorithms and reaches the conclusion that E-RLS is more feasible according to the comparison output of the simulation program from tracking performance and mean square error over five fast time variation of Rayleigh fading channels and more than one time (send/receive) reach to 100 times to make sure from efficiency of these algorithms.
The objective of this work is to study the influence of end milling cutting process parameters, tool material and geometry on multi-response outputs for 4032 Al-alloy. This can be done by proposing an approach that combines Taguchi method with grey relational analysis. Three cutting parameters have been selected (spindle speed, feed rate and cut depth) with three levels for each parameter. Three tools with different materials and geometry have been also used to design the experimental tests and runs based on matrix L9. The end milling process with several output characteristics is solved using a grey relational analysis. The results of analysis of variance (ANOVA) showed that the major influencing parameters on multi-objective response w
... Show MoreThis research includes the study of dual data models with mixed random parameters, which contain two types of parameters, the first is random and the other is fixed. For the random parameter, it is obtained as a result of differences in the marginal tendencies of the cross sections, and for the fixed parameter, it is obtained as a result of differences in fixed limits, and random errors for each section. Accidental bearing the characteristic of heterogeneity of variance in addition to the presence of serial correlation of the first degree, and the main objective in this research is the use of efficient methods commensurate with the paired data in the case of small samples, and to achieve this goal, the feasible general least squa
... Show MoreThis research aims at making a comparative survey between the dry season in (2017-2018) and the wet season (2018-2019) in Iraq concerning the variation of rainfall and pressure systems responsible for such a difference. In this paper, seven climatological stations have been selected: Mosul, Kirkuk, Khanaqin, Baghdad, Rutba, Diwaniyah and Basra. Results have shown that the first category of rainfall of the two seasons has recorded a higher number of rainy days in comparison with the second and third categories with a total of 274 day in a dry season and 403 day of a wet season. Further, the total amount of the annual continuous rain is higher than the total of thunderstorms in a dry season as well as in the
... Show MoreShowing animal shapes is one of the primary topics since the discovery of cave drawings, with semantic discourses, as they appeared in the ancient civilization of Iraq, with their discourse and intellectual structure, and their reflections on their plastic achievements. The research deals with three topics: the first (an introduction to the concept of discourse), the second: (the historical roots of animal forms), and the third (the manifestation of animal forms and their discourse, in Mesopotamia). Mesopotamian fauna and its concepts? What are the?, Its importance was also represented in: the presence of animals and their semantic and conceptual discourse, especially the sculptures (the lion and the bull), with the aim of revealing the
... Show MoreThis research is a theoretical study that deals with the presentation of the literature of statistical analysis from the perspective of gender or what is called Engendering Statistics. The researcher relied on a number of UN reports as well as some foreign sources to conduct the current study. Gender statistics are defined as statistics that reflect the differences and inequality of the status of women and men overall domains of life, and their importance stems from the fact that it is an important tool in promoting equality as a necessity for the process of sustainable development and the formulation of national and effective development policies and programs. The empowerment of women and the achievement of equality between men and wome
... Show MoreThis research which is entitled (Devine Beauty), aims at studying the philosophical and literary extensive visions of Andalusian poets in search of pleasure in the beauty of divine self and its impact on the formation of a philosophical frame of mind. It also attempts to investigate the aesthetic aspects that highlight the prestige and greatness and majesty of that absolute beauty.
The most important conclusion of the reach is the Bany Ahmar poets use the beauty of women and the pleasure of wine as cods to reach divine beauty and get the happiness desired with the reflection of absolute beauty in a clear philosophy and thinking of the kingdom of God Almighty.
An efficient modification and a novel technique combining the homotopy concept with Adomian decomposition method (ADM) to obtain an accurate analytical solution for Riccati matrix delay differential equation (RMDDE) is introduced in this paper . Both methods are very efficient and effective. The whole integral part of ADM is used instead of the integral part of homotopy technique. The major feature in current technique gives us a large convergence region of iterative approximate solutions .The results acquired by this technique give better approximations for a larger region as well as previously. Finally, the results conducted via suggesting an efficient and easy technique, and may be addressed to other non-linear problems.
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos