Preferred Language
Articles
/
8hc-848BVTCNdQwCnoBQ
Downlink Training Sequence Design Based on Waterfilling Solution for Low-Latency FDD Massive MIMO Communications Systems
...Show More Authors

Future generations of wireless communications systems are expected to evolve toward allowing massive ubiquitous connectivity and achieving ultra-reliable and low-latency communications (URLLC) with extremely high data rates. Massive multiple-input multiple-output (m-MIMO) is a crucial transmission technique to fulfill the demands of high data rates in the upcoming wireless systems. However, obtaining a downlink (DL) training sequence (TS) that is feasible for fast channel estimation, i.e., meeting the low-latency communications required by future generations of wireless systems, in m-MIMO with frequency-division-duplex (FDD) when users have different channel correlations is very challenging. Therefore, a low-complexity solution for designing the DL training sequences to maximize the achievable sum rate of FDD systems with limited channel coherence time (CCT) is proposed using a waterfilling power allocation method. This achievable sum rate maximization is achieved using sequences produced from a summation of the user’s covariance matrices and then applying a waterfilling power allocation method to the obtained low-complexity training sequence. The results show that the proposed TS outperforms the existing methods in the medium and high SNR regimes while reducing computational complexity. The obtained results signify the proposed TS’s feasibility for practical consideration compared with the existing DL training sequence designs.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
2016 International Conference On Advances In Electrical, Electronic And Systems Engineering (icaees)
Efficient routing algorithm for VANETs based on distance factor
...Show More Authors

There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th

... Show More
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Oct 19 2018
Journal Name
Journal Of Economics And Administrative Sciences
THE IMPACT OF TRAINING BASED UPON MERITS IN IMPROVING THE EMPLOYEES PERFORMANCE AT THE JORDANIAN UNIVERSITY HOSPITALS Abstract
...Show More Authors

The study aims to identify the impact of competency-based training in its dimensions (skills, cognitive abilities, attitudes, and attitudes) in improving the performance of employees (achievement, strategic thinking and problem solving) in Jordanian university hospitals.

The study based on analytical descriptive method. The study population consisted of the Jordanian University Hospitals, the University Hospital of Jordan and the King Abdullah Hospital, as applied study case. The sample of the study consists of all upper and middle administrative employees of these hospitals; questionnaire distributed all of them and the number of valid questionnaires for analysis were 182 questionnaire.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Finite Element Based Solution of Laplace's Equation Applied to Electrical Activity of the Human Body
...Show More Authors

Computer models are used in the study of electrocardiography to provide insight into physiological phenomena that are difficult to measure in the lab or in a clinical environment.

The electrocardiogram is an important tool for the clinician in that it changes characteristically in a number of pathological conditions. Many illnesses can be detected by this measurement. By simulating the electrical activity of the heart one obtains a quantitative relationship between the electrocardiogram and different anomalies.

Because of the inhomogeneous fibrous structure of the heart and the irregular geometries of the body, finite element method is used for studying the electrical properties of the heart.

This work describes t

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 01 2026
Journal Name
Applied Acoustics
Development of an acoustic vacuum gauge for low-pressure measurement
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Wed Aug 01 2018
Mixed Linearity Improvement Techniques for Ultra-wideband Low Noise Amplifier
...Show More Authors

<span>We present the linearization of an ultra-wideband low noise amplifier (UWB-LNA) operating from 2GHz to 11GHz through combining two linearization methods. The used linearization techniques are the combination of post-distortion cancellation and derivative-superposition linearization methods. The linearized UWB-LNA shows an improved linearity (IIP3) of +12dBm, a minimum noise figure (NF<sub>min.</sub>) of 3.6dB, input and output insertion losses (S<sub>11</sub> and S<sub>22</sub>)  below -9dB over the entire working bandwidth, midband gain of 6dB at 5.8GHz, and overall circuit power consumption of 24mW supplied from a 1.5V voltage source. Both UWB-LNA and linearized UWB-LNA designs are

... Show More
Scopus (1)
Scopus Crossref
Publication Date
Tue Oct 30 2018
Journal Name
Journal Of Engineering
Direct Contact Membrane Distillation for Desalination Brine Solution
...Show More Authors

Desalination is a process where fresh water produces from high salinity solutions, many ways used for this purpose and one of the most important processes is membrane distillation (MD). Direct contact membrane distillation (DCMD) can be considered as the most prominent type from MD types according to ease of design and modus operandi. This work studies the efficiency of using DCMD operation for desalination brine with different concentration (1.75, 3.5, 5 wt. % NaCl). Frame and plate cell was used with flat sheet PTFE hydrophobic type membrane. The study proves that MD is an effective process for desalination brines with feed temperature less than 60˚C especially for feed with low TDS. 37˚C, 47˚C, and 57˚C was feed t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design And Implementation of Microcontroller Based Curing Light Control of Dental System.
...Show More Authors

In this paper, a microcontroller-based electronic circuit have been designed and implemented for dental curing system using 8-bit MCS-51 microcontroller. Also a new control card is designed while considering advantages of microcontroller systems the time of curing was controlled automatically by preset values which were input from a push-button switch. An ignition based on PWM technique was used to reduce the high starting current needed for the halogen lamp. This paper and through the test result will show a good performance of the proposed system.

 

 

View Publication Preview PDF