Multi-carrier direct sequence code division multiple access (MC-DS-CDMA) has emerged recently as a promising candidate for the next generation broadband mobile networks. Multipath fading channels have a severe effect on the performance of wireless communication systems even those systems that exhibit efficient bandwidth, like orthogonal frequency division multiplexing (OFDM) and MC-DS-CDMA; there is always a need for developments in the realisation of these systems as well as efficient channel estimation and equalisation methods to enable these systems to reach their maximum performance. A novel MC-DS-CDMA transceiver based on the Radon-based OFDM, which was recently proposed as a new technique in the realisation of OFDM systems, will be used here as a basic building block in the design of MC-DS-CDMA transceiver to increase the orthogonality against the multipath frequency selective fading channels. Simulation results are provided to demonstrate the significant gains in performance and simplicity due to the proposed techniques. Copyright © 2010 Inderscience Enterprises Ltd.
The present study aimed to asspssment the nutrition a program to sample of student from internal departments of Baghdad University (AL-Jadiriya Complex) and the University of AL-MustanSiriya four grades and aged (19-24) year study included 150 male and female students by (75) male and (75) of female register height, weight nd body mass index were study habits and food pattern of the same sample (150) and by aspecial form and take the personal information interviews and record information on food intake during 24 hour .noted adifference practie in the weights and longths of male and female (sample).
BMI rates were within the normal weight as the value of BMI for males aged (19- 21)and (22-24) and (22.21) and (23,37),respectively and th
Social protection meets different aspects of the needs of vulnerable groups, such as the economic, health, education, and family relations and ties in the Iraqi society. This is because vulnerable groups have suffered from social and economic influences that have negative implications on the social reality as a whole. Poverty is a case in point, which paved the way to frequent setbacks that have led to social structure instability. Accordingly, the present study aims to examine the role and effect of the Net of Social Protection Program in equally distributing social protection to curb or mitigate any negative consequnces that might happen to the poor segments and vulnerable people, who are succeptible to shocks, such as: the orphans, un
... Show MoreThe research topic was chosen as a result of the importance of human resource in business organizations in general and the industrial process in particular. Without the human resource, business organizations cannot continue and achieve success and excellence, and the research problem has been diagnosed in the lack of sales of General Cement Company’s northern products, despite their distinctiveness, standing, and reputation in The market and its products with standard specifications, and through this problem, the following questions were raised: &nbs
... Show MoreQuality control of well logs has always been an important objective in reservoir studies because of the key role played by well logs as input data. This study aims to make a quality control on well logs data for two wells of Yamama formation in southern Iraqi field to ensuring and enhancing the measurement accuracy. In the beginning, the calibration data of before and after surveys are applied as initial evaluation for the quality of density log in well R-1. Then, depth matching is used to fit the depth of all logs in each well. After that, the comparison between the main and repeat sections is helped to check the repeatability. Finally, all uncorrected logs are environmentally corrected to remove the effects of the borehole conditi
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t
The designer must find the optimum match between the object's technical and economic needs and the performance and production requirements of the various material options when choosing material for an engineering application. This study proposes an integrated (hybrid) strategy for selecting the optimal material for an engineering design depending on design requirements. The primary objective is to determine the best candidate material for the drone wings based on Ashby's performance indices and then rank the result using a grey relational technique with the entropy weight method. Aluminum alloys, titanium alloys, composites, and wood have been suggested as suitable materials for manufacturing drone wings. The requirement
... Show MoreThis research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the