Preferred Language
Articles
/
BoblQoYBIXToZYALiYHp
Medium access control protocol design for wireless communications and networks review
...Show More Authors

<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive number of antenna elements to improve both spectral efficiency and energy efficiency. On the other hand, the second research method (PD-NOMA) allows multiple non-orthogonal signals to share the same orthogonal resources by allocating different power level for each station. PD-NOMA has a better spectral efficiency over the orthogonal multiple access methods. A review of previous works regarding the MAC design for different wireless networks is classified based on different categories. The main contribution of this research work is to show the importance of the MAC design with added optimal functionalities to improve the spectral and energy efficiencies of the wireless networks.</span></p>

Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
SPEECH RECOGNITION OF ARABIC WORDS USING ARTIFICIAL NEURAL NETWORKS
...Show More Authors

The speech recognition system has been widely used by many researchers using different
methods to fulfill a fast and accurate system. Speech signal recognition is a typical
classification problem, which generally includes two main parts: feature extraction and
classification. In this paper, a new approach to achieve speech recognition task is proposed by
using transformation techniques for feature extraction methods; namely, slantlet transform
(SLT), discrete wavelet transforms (DWT) type Daubechies Db1 and Db4. Furthermore, a
modified artificial neural network (ANN) with dynamic time warping (DTW) algorithm is
developed to train a speech recognition system to be used for classification and recognition
purposes. T

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Iraqi Journal Of Science
PLAGIARISM DETECTION SYSTEM IN SCIENTIFIC PUBLICATION USING LSTM NETWORKS
...Show More Authors

Scopus (2)
Scopus
Publication Date
Wed Dec 29 2021
Journal Name
Al-khwarizmi Engineering Journal
Analysis of Magnetorheological Normally Close Directional Control Valve: Magnetorheological normally close directional control valve
...Show More Authors

This valve is intended for use in valves for steering movement, using the qualities of the Magneto-rheological (MR) fluid to regulate the fluid, direct contact without the utilization of moving parts like a spool, a connection between electric flux, and fluid power was made, The simulation was done to employ the" finite element method of magnetism (FEMM)" to arrive at the best design. This software is used for magnetic resonance valve finite element analysis. The valve's best performance was obtained by using a closed directional control valve in the normal state normally closed (NC) MR valve, with simulation results revealing the optimum magnetic flux density in the absence of a current and the shedding condition, as well as the optimum

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Mar 21 2022
Journal Name
International Journal For Research In Applied Sciences And Biotechnology
Article Review: Toll-like Receptors and COVID-19
...Show More Authors

By March 2020, a pandemic had been emerged Corona Virus Infection in 2019 (COVID-19), which was triggered through the sensitive pulmonary syndrome (SARS disease corona virus- 2 (SARS COV-2). Overall precise path physiology of SARS COV-2 still unknown, as does the involvement of every element of the acute or adaptable immunity systems. Additionally, evidence from additional corona virus groups, including SARS COV as well as the Middle East pulmonary disease, besides that, fresh discoveries might help researchers fully comprehend SARS CoV-2. Toll-like receptors (TLRs) serve a critical part in both detection of viral particles as well as the stimulation of the body's immune response. When TLR systems are activated, pro-inflammatory cy

... Show More
View Publication
Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Advances In Science And Technology Research Journal
Vein Biometric Recognition Methods and Systems: A Review
...Show More Authors

View Publication
Scopus (12)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Oct 04 2018
Journal Name
Irrigation And Drainage
Agricultural Irrigation Pricing: Review of Theories and Practices
...Show More Authors
Abstract<p>Water pricing and substitution of the costs of irrigation investment operation and maintenance have been controversial issues for a long time. The small charges for irrigation water are addressed, and additionally, the low level of farmers who pay the costs. In a few schemes, expense accumulation rates are close to zero, notwithstanding when water charges are well beneath the cost of operation and maintenance. Water prices are charged to farmers for two essential objectives. The first is to cover the operation and maintenance estimation with the goal that the investment is fiscally practical. Much of the time, costs will likewise need to incorporate a price for the cost of capital required to develop</p> ... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Jun 17 2025
Journal Name
Philosophy Journal
Critical-cultural discourse and review of political action
...Show More Authors

View Publication
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Urban Form Elements and Urban Potentiality ( Literature Review)
...Show More Authors

Morphological theories shape the leading platform to theoretically and practically consider the assets connected with the emergence of the city, and its growth and development over time. In this paper, five elements of the urban form are typified: structure/tissue, plot, building, block, and the street pattern will be addressed. Understanding the urban form at the different levels within its ingredients could lead to shape a base launch of how to consider the potentiality of the development and sustainability of a particular area.   

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Face mask detection methods and techniques: A review
...Show More Authors

Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m

... Show More
View Publication
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus Crossref