Preferred Language
Articles
/
bsj-6219
Wireless Propagation Multipaths using Spectral Clustering and Three-Constraint Affinity Matrix Spectral Clustering
...Show More Authors

This study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise Jaccard index of the membership of the multipaths to their clusters. The multipaths generated by C2CM were transformed using the directional cosine transform (DCT) and the whitening transform (WT). The transformed dataset was clustered using SC and 3CAM-SC. The clustering performance was validated using the Jaccard index by comparing the reference multipath dataset with the calculated multipath clusters. The results show that the effectiveness of SC is similar to the state-of-the-art clustering approaches. However, 3CAM-SC outperforms SC in all channel scenarios. SC can be used in indoor scenarios based on accuracy, while 3CAM-SC is applicable in indoor and semi-urban scenarios. Thus, the clustering approaches can be applied as alternative clustering techniques in the field of channel modeling.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Water Treatment Using Zinc Nanoparticles and Apricot Plant Extracts from Organic and Inorganic Pollution
...Show More Authors

 

The apricot plant was washed, dried, and powdered after harvesting to produce a fine powder that was used in water treatment. created an alcoholic extract from the apricot plant using ethanol, which was then analysed using GC-MS, Fourier transform infrared spectroscopy, and ultraviolet-visible spectroscopy to identify the active components. Zinc nanoparticles were created using an alcoholic extract. FTIR, UV-Vis, SEM, EDX, and TEM are used to characterize zinc nanoparticles. Using a continuous processing procedure, zinc nanoparticles with apricot extract and powder were employed to clean polluted water. Firstly, 2 g of zinc nanoparticles were used with 20 ml of polluted water, and the results were Tetra 44% and Levo 32%; after

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Study of Mechanical Properties of (Al-Cu-Mg) Alloy Matrix Composite
...Show More Authors

The present research had dealt with preparing  bars  with the length of about  (13 cm) and  adiametar  of  (1.5 cm) of composite materials with metal  matrix  represented by (Al-Cu-Mg) alloy cast enforced by (ZrO2) particles with chosen weight  percentages (1.5, 2.5 ,3.5, 5.5 %). The base  cast and the composite  materials were prepared by casting method by uses vortex  Technique inorder to  fix up (ZrO2) particles in homogeneous way on  the  base cast. In addition to  that, two main groups of composite materials were prepared depending on the particles size of (ZrO2) , respectively.       &n

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Matrix Form of Deriving High Order Schemes for the First Derivative
...Show More Authors

For many problems in Physics and Computational Fluid Dynamics (CFD), providing an accurate approximation of derivatives is a challenging task. This paper presents a class of high order numerical schemes for approximating the first derivative. These approximations are derived based on solving a special system of equations with some unknown coefficients. The construction method provides numerous types of schemes with different orders of accuracy. The accuracy of each scheme is analyzed by using Fourier analysis, which illustrates the dispersion and dissipation of the scheme. The polynomial technique is used to verify the order of accuracy of the proposed schemes by obtaining the error terms. Dispersion and dissipation errors are calculated

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Mechanical PropertiesInvestigation of Unidirectional Woven Carbon Fiber Reinforced Epoxy Matrix Composite
...Show More Authors

In this study, the mechanical properties of an epoxy and unidirectional woven carbon with fiberglass composite were experimentally investigated. When preparing the composite samples, American Society for Testing and Materials (ASTM)standard was used. Tensile, impact and flexural test were conducted to investigate the mechanical properties of the new produced epoxy Unidirectional Woven Carbon and Epoxy Fiberglass composites. The outcome showed that the strength of the produced samples increased with the increase in the number of unidirectional woven carbon layers added. Two methods were utilized: (1) woven carbon composite with glass fiber (2) woven carbon composite). The two methods of composite were compared with each other.  The resul

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of select

... Show More
View Publication Preview PDF
Scopus (33)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
Geolocation Android Mobile Phones Using GSM/UMTS
...Show More Authors

The proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location AP

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Comparison between the BEKK and DVECH Models of Multivariate GARCH Models with Practical Application
...Show More Authors

The Purpose of this research is a comparison between two types of multivariate GARCH models BEKK and DVECH to forecast using financial time series which are the series of daily Iraqi dinar exchange rate with dollar, the global daily of Oil price with dollar and the global daily of gold price with dollar for the period from 01/01/2014 till 01/01/2016.The estimation, testing and forecasting process has been computed through the program RATS. Three time series have been transferred to the three asset returns to get the Stationarity, some tests were conducted including Ljung- Box, Multivariate Q and Multivariate ARCH to Returns Series and Residuals Series for both models with comparison between the estimation and for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 07 2013
Journal Name
Journal Of Educational And Psychological Researches
U.S. occupation of Iraq and its relationship to the psychological and political culture and social among university students
...Show More Authors

The culture of the daily necessities of life of the individual in any society, whether advanced or simple, and the concept of multiple aspects of culture, including what is culture and education there holds that art is culture, and there are those who are classified according to human societies .. Some also go to it is not related to the study and learning .. And has been Iraq as a symbol of Arab culture, but they declined because of what passed by political crises and social in its modern history, and aims Current search to study culture psychological, political and social among the students of the university after the U.S. occupation of Iraq, the researcher prepared a questionnaire and after hold the appropriate statistical met

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The art of patchwork in designing and making night gowns and their supplements: The art of patchwork in designing and making night gowns and their supplements
...Show More Authors

Abstract:
If we neglect the value of historical fashions as a source of inspiration for
contemporary fashion designers we will neglect a treasure of original designs.
In neglecting such a treasure how could we then know what is original. Today
the most famous fashion designers are often inspired, in the outwardly from
and internal lines of their fashions, by fashion designed during the ages of the
past.
Designers can find such fashions in books of history and museums. But
the historical ages are not equal in the fertility of the originality and novelty of
their fashions. Thus the contemporary designer may not find the old designs
inspiring so he invents them.
The researcher was keen in this paper to inclu

... Show More
View Publication Preview PDF