Preferred Language
Articles
/
joe-674
Performance of Different Concatenated Coding Schemes for CDMA System
...Show More Authors

In this paper different channel coding and interleaving schemes in DS/CDMA system over multipath fading channel were used. Two types of serially concatenated coding were presented. The first one composed of Reed-Solomon as outer code, convolutional code as inner code and the interleaver between the outer and inner codes and the second consist of convolutional code as outer code, interleaved in the middle and differential code as an inner code. Bit error rate performance of different schemes in multipath fading channel was analyzed and compared. Rack receiver was used in DS/CDMA receiver to combine multipath components in order to enhance the signal to noise ratio at the receiver.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 01 2022
Journal Name
Iop Conference Series: Earth And Environmental Science
Effluent Quality Assessment Monitoring of Al-Rustamiya Sewage Treatment Plant Using Geographical Information System (GIS)
...Show More Authors
Abstract<p>Water quality assessment offers a scientific basis for water resource development and management. This research aims to assessment of Al-Rustamiya sewage treatment plant depending on annually changes and produces maps that declare changes on parameter during a period (2015-2018). Based on prior Government Department Baghdad Environment data which annually feature changes for samples from Northern Rustamiya have been estimated as a working model. Drawn a map of the Diyala River shows annual changes in the characteristics of the Diyala River, based on northern and southern Rustamiya effluent samples, and Diyala River samples. The characteristics that research focused on were biochemical</p> ... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Fri Nov 01 2019
Journal Name
Indian Journal Of Natural Sciences
The Numerical and Experimental Work of Chaos System in Three Dimensions Phase Spaceusing Rossler Circuit
...Show More Authors

In this paper, we deal with a dynamical system that can demonstrate a chaotic attractor of Rossleroscillator. We simulate the Rosslerequations numerically then we investigate the model experimentally. Numerically, the Rossler parameter a and b were fixed and c was changed.The evolution of the system exhibits period, period-doubling, second period doubling, and chaos when control parameters are changed. This evolution can be seen by analyze the time series, the bifurcation diagrams and phase space. Experimentally, the evolution of the system exhibited the same numerical behavior by changing the resistance (Rv) in Rossler circuit that represent as control parameter.

Publication Date
Sun Sep 02 2007
Journal Name
Iraqi Postgraduate Medical Journal
The Efficacy of Dextran 70 on Reticuloendothelial System in Systemically Infected Mice with Klebsiella Pneumoniae
...Show More Authors

The reticuloendothelial system (RES) play an important role in immunity against bacterial infection and Klebsiella pneumoniae one of the most common causes of hospital-acquired infections. Dextran70 (D70), a polysaccharide, may alter functions of this system through changing many biological activities in the tissues.

Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
Prevent administrative and financial corruption behaviors by activating the functions of the organizational immunity system
...Show More Authors

The current research aims at testing the relationship between organizational immunity and preventing administrative and financial corruption (AFC) in Iraq. The Statistical Package for the Social Sciences program (R& SPSS) was used to analyse the associated questionnaire data. The research problem has examined how to activate the functions of the organizational immune system to enable it to face organizational risks, attempt to prevent administrative and financial corruption, and access the mechanisms by which to develop organizational immunity. A sample of 161 individuals was taken who worked in the Directorate General of Education, Karbala. Also, it was concluded to a lack of memory function for organizational immunity. In a

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Dec 16 2024
Journal Name
Light & Engineering
The Design and Experimental Realization of a Laser-Based Heating System Using Recycled Laser Module
...Show More Authors

Laser is a powerful device that has a wide range of applications in fields ranging from materials science and manufacturing to medicine and fibre optic communications. One remarkable

View Publication
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
Heat Transfer Analysis of Conventional Round Tube and Microchannel Condensers in Automotive Air Conditioning System
...Show More Authors

In this paper, an experimental analysis of conventional air-cooled and microchannel condensers in automotive vapor compression refrigeration cycle concerning heat transfer coefficient and energy using R134a as a refrigerant was presented. The performance of two condensers and cycles tested regarding ambient temperature which it was varied from 40oC to 65oC, while the indoor temperature and load have been set to be 23oC and 2200 W respectively. Results showed that the microchannel condenser has 224 % and 77 % higher refrigerant side and air side heat transfer coefficient respectively than the coefficients of the conventional condenser. Thus, the COP, in case of using the microchannel

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Using Adaptive Neuro Fuzzy Inference System to Predict Rate of Penetration from Dynamic Elastic Properties
...Show More Authors

Rate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal.  The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jun 28 2023
Journal Name
Mathematics
The Impact of Fear on a Harvested Prey–Predator System with Disease in a Prey
...Show More Authors

A mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (5)
Scopus Clarivate Crossref