Preferred Language
Articles
/
bsj-6629
Performance Analysis of Propagation in VHF Military Tactical Communication System
...Show More Authors

The main challenge of military tactical communication systems is the accessibility of relevant information on the particular operating environment required for the determination of the waveform's ideal use. The existing propagation model focuses mainly on broadcasting and commercial wireless communication with a highs transceiver antenna that is not suitable for numerous military tactical communication systems. This paper presents a study of the path loss model related to radio propagation profile within the suburban in Kuala Lumpur. The experimental path loss modeling for VHF propagation was collected from various suburban settings for the 30-88 MHz frequency range. This experiment was highly affected by ecological factors and existing wave propagation effects such as reflection, diffraction, scattering, and Doppler effect. Radio propagation performance is evaluated by collecting received power at the allocated substation and comparing it against existing propagation models. The existing propagation model also will be tuned close to the measurement value by identifying the best path loss exponent to perform a suitable model for a suburban area. Theoretical assessments and analysis of the initial measurement stage for radio propagation show the extensive contribution of radio field from potential obstacles at lower VHF frequencies for both short and medium ranges around there. The explanation indicates the standard radio propagation prediction models that are generally reasonable for the suburban area. From the general error analysis, it is seen that, the performance of the LDPL with adjusting path loss exponent is the suitable model since it has least value of error metrics.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 01 2017
Journal Name
2017 Second International Conference On Fog And Mobile Edge Computing (fmec)
Smart Virtual eNB (SVeNB) for 5G mobile communication
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jun 28 2023
Journal Name
Al–bahith Al–a'alami
Is it Time to Develop Government Communication Functions?
...Show More Authors

Embracing digital technological advancements in media and communication has led government entities to adopt communication practices fully aligned with the digital and networked system in government communication. Traditional media practices within the government environment increasingly rely on the ability to utilize digital tools and systems for content creation, communication, evaluation, and the management of the entire communication process within an electronic and intelligent framework for government services. Naturally, this transformation has caught the attention of communication and public relations researchers worldwide, as the digital and networked aspects of government communication now form an intelle

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Oct 01 2012
Journal Name
Applied Energy
Analysis of thermal and electrical performance of a hybrid (PV/T) air based solar collector for Iraq
...Show More Authors

The electrical and thermal performance of a typical single pass hybrid photovoltaic/thermal (PV/T) air collector is modeled, simulated and analyzed for two selected case studies in Iraq. An improved mathematical thermo-electrical model is derived in terms of design, operating and climatic parameters of the hybrid solar collector to evaluate its important characteristics: collector flow and heat removal factors, PV maximum power point and its temperature coefficient, and overall power and efficiency. Unlike previous PV/T thermal models, the present model is obtained with some additions and corrections in radiation and convection heat coefficients for the top loss and for the air duct with more applicable sky temperature correlation. The well

... Show More
View Publication
Scopus (137)
Crossref (121)
Scopus Crossref
Publication Date
Mon Oct 01 2012
Journal Name
Applied Energy
Analysis of thermal and electrical performance of a hybrid (PV/T) air based solar collector for Iraq
...Show More Authors

View Publication
Scopus (137)
Crossref (121)
Scopus Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the relationship between Government spending compression and the window of the currency and its impact on the exchange rate of the Iraqi dinar
...Show More Authors

The exchange rate is the backbone of  any economy in the world, whether  developed or developing, where most countries adopted  many policies, in order to ensure the stability of the exchange rate of the currency, because of its importance as a link between the local economy and the others ,And it contribute in the achievement of internal and external balance and despite the many different factors that affect it, but there is wide consensus on the effectiveness of the role of spending and the currency window in the exchange rate of the Iraqi dinar, especially in the Iraqi economy, effectiveness As the increase in government spending lead to an increase in the supply of money and increase domestic demand and high pr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Networks And Systems
Proceedings of Ninth International Congress on Information and Communication Technology
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
View Publication
Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Training Program for Children with Autism and their Mothers Based on the Picture Exchange Commination System to Confront Some of Basic Disorders for these Children
...Show More Authors

Abstract

The current research aims to examine the effectiveness of a training program for children with autism and their mothers based on the Picture Exchange Communication System to confront some basic disorders in a sample of children with autism. The study sample was (16) children with autism and their mothers in the different centers in Taif city and Tabuk city. The researcher used the quasi-experimental approach, in which two groups were employed: an experimental group and a control group. Children aged ranged from (6-9) years old. In addition, it was used the following tools: a list of estimation of basic disorders for a child with autism between (6-9) years, and a training program for children with autism

... Show More
View Publication Preview PDF
Publication Date
Thu May 21 2026
Journal Name
Al-rafidain University College For Sciences
“Simple Regression Analysis by using Linear Programming Technique and illustration of Absolute Residuals method with another Estimation Techniques”
...Show More Authors

This research deals with unusual approach for analyzing the Simple Linear Regression via Linear Programming by Two - phase method, which is known in Operations Research: “O.R.”. The estimation here is found by solving optimization problem when adding artificial variables: Ri. Another method to analyze the Simple Linear Regression is introduced in this research, where the conditional Median of (y) was taken under consideration by minimizing the Sum of Absolute Residuals instead of finding the conditional Mean of (y) which depends on minimizing the Sum of Squared Residuals, that is called: “Median Regression”. Also, an Iterative Reweighted Least Squared based on the Absolute Residuals as weights is performed here as another method to

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 28 2021
Journal Name
Journal Of The College Of Education For Women
A Critical Discourse Analysis of Martin Crimp’s Piece “Advice to Iraqi Women”: عفراء عبد الحسين ناصر , سراب خليل
...Show More Authors

Language is a vehicle for social values and ideologies that a man intends or attempts to express. Dramatic texts are one of the discursive practices that embody values and ideologies. What is expressed in dramatic text is deliberate because it is meant to affect other’s values, trends and ideologies in one way or another. Such ideologies and values are not explicit. To bring them out requires putting language under scrutiny to unveil what is implied. The present study attempts to analyze a dramatic script entitled Advice to Iraqi Women by the British playwright Martin Crimp in an attempt to unveil the intended political ideologies underlying the text. The title reflects a political aspect embedded in the word “Iraqi” that

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref