Massive multiple-input multiple-output (MaMi) systems have attracted much research attention during the last few years. This is because MaMi systems are able to achieve a remarkable improvement in data rate and thus meet the immensely ongoing traffic demands required by the future wireless networks. To date, the downlink training sequence (DTS) for the frequency division duplex (FDD) MaMi communications systems have been designed based on the idealistic assumption of white noise environments. However, it is essential and more practical to consider the colored noise environments when designing an efficient DTS for channel estimation. To this end, this paper proposes a new DTS design by exploring the joint use of spatial channel and noise covariance matrices, when the channel is not reciprocal but the coherence block length remains limited. We derive an analytical solution for the mean square error (MSE) based on the proposed training design with colored noise. In addition, this paper exploits the method of random matrix theory to provide an analytical solution for the downlink (DL) achievable sum rate of the regularized zero forcing beamforming (RZFBF) precoder. Numerical results demonstrate that using the proposed DTS design, the MSE of the channel estimate is significantly reduced compared with the conventional training designs with white noise. Furthermore, the results show that the proposed pilot design markedly improves the DL achievable SR over the conventional training designs, especially at relatively low signal-to-noise-ratio (SNR) levels. This enables FDD MaMi systems to operate under more practical scenarios of colored noise and limited coherence time environments.
Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
In this paper, a computational method for solving optimal problem is presented, using indirect method (spectral methodtechnique) which is based on Boubaker polynomial. By this method the state and the adjoint variables are approximated by Boubaker polynomial with unknown coefficients, thus an optimal control problem is transformed to algebraic equations which can be solved easily, and then the numerical value of the performance index is obtained. Also the operational matrices of differentiation and integration have been deduced for the same polynomial to help solving the problems easier. A numerical example was given to show the applicability and efficiency of the method. Some characteristics of this polynomial which can be used for solvin
... Show MoreIn this paper an attempt to provide a single degree of freedom lumped model for fluid structure interaction (FSI) dynamical analysis will be presented. The model can be used to clarify some important concept in the FSI dynamics such as the added mass, added stiffness, added damping, wave coupling ,influence mass coefficient and critical fluid depth . The numerical results of the model show that the natural frequency decrease with the increasing of many parameters related to the structure and the fluid .It is found that the interaction phenomena can become weak or strong depending on the depth of the containing fluid .The damped and un damped free response are plotted in time domain and phase plane for different model parameters It is fou
... Show MorePure nano Ferro fluid was synthesized by chemical co-precipitation method. The composite of polyaniline with nano sized Ferro fluid was prepared by In-situ–chemical oxidation polymerization method with ammonium per sulphate as an oxidant in aqueous hydrochloric acid under constant stirring at room temperature. The optical properties, absorption, transmission, optical energy gap (Eg) and optical constant refractive index (n) have been investigated. The value of the Eg decreased with increasing Ferro fluid concentration.
The Korteweg-de Vries equation plays an important role in fluid physics and applied mathematics. This equation is a fundamental within study of shallow water waves. Since these equations arise in many applications and physical phenomena, it is officially showed that this equation has solitary waves as solutions, The Korteweg-de Vries equation is utilized to characterize a long waves travelling in channels. The goal of this paper is to construct the new effective frequent relation to resolve these problems where the semi analytic iterative technique presents new enforcement to solve Korteweg-de Vries equations. The distinctive feature of this method is, it can be utilized to get approximate solution
... Show MoreFour different spectrophotometric methods are used in this study for the determination of Sulfamethoxazole and sulfanilamide drugs in pharmaceutical compounds, synthetic samples, and in their pure forms. The work comprises four chapters which are shown in the following: Chapter One: Includes a brief for Ultraviolet-Visible (UV-VIS) Absorption spectroscopy, antibacterial drugs and sulfonamides with some methods for their determination. The chapter lists two methods for optimization; univariate method and multivariate method. The later includes different types, two of these were mentioned; simplex method and design of experiment method. Chapter Two: Includes reaction of the two studied drugs with sodium nitrite and hydrochloric acid for diazo
... Show MoreSteganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount.
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreIn this paper we will investigate some Heuristic methods to solve travelling salesman problem. The discussed methods are Minimizing Distance Method (MDM), Branch and Bound Method (BABM), Tree Type Heuristic Method (TTHM) and Greedy Method (GRM).
The weak points of MDM are manipulated in this paper. The Improved MDM (IMDM) gives better results than classical MDM, and other discussed methods, while the GRM gives best time for 5≤ n ≤500, where n is the number of visited cities.