<span lang="EN-US">The fundamental of a downlink massive multiple-input multiple-output (MIMO) energy- issue efficiency strategy is known as minimum mean squared error (MMSE) implementation degrades the performance of a downlink massive MIMO energy-efficiency scheme, so some improvements are adding for this precoding scheme to improve its workthat is called our proposal solution as a proposed improved MMSE precoder (PIMP). The energy efficiency (EE) study has also taken into mind drastically lowering radiated power while maintaining high throughput and minimizing interference issues. We further find the tradeoff between spectral efficiency (SE) and EE although they coincide at the beginning but later their interests become conflicting and divergent then leading EE to decrease so gradually while SE continues increasing logarithmically. The results achieved that for a single-cellular massive MU-MIMO downlink model, our PIMP scheme is the appropriate scenario to achieve higher precoding performance system. Furthermore, both maximum ratio transmission (MRT) and PIMP are suitable for performance improvement in massive MIMO results of EE and SE. So, the main contribution comes with this work that highest EE and SE are belong to use a PIMP which performs better appreciably than MRT at bigger ratio of number of antennas to the number of the users. </span>
Solar photovoltaic (PV) has many environmental benefits and it is considered to be a practical alternative to traditional energy generation. The electrical conversion efficiency of such systems is inherently limited due to the relatively high thermal resistance of the PV components. An approach for intensifying electrical and thermal production of air-type photovoltaic thermal (PVT) systems via applying a combination of fins and surface zigzags was proposed in this paper. This research study aims to apply three performance enhancers: case B, including internal fins; case C, back surface zigzags; and case D, combinations of fins and surface zigzags; whereas the baseline smooth duct rep
The minimum approaches distance of probing electrons in scanning electron microscope has investigated in accordance to mirror effect phenomenon. The analytical expression for such distance is decomposed using the binomial expansion. With aid of resulted expansion, the distribution of trapped electrons within the sample surface has explored. Results have shown that trapped electron distributes with various forms rather an individual one. The domination of any shape is mainly depend on the minimum approaches distance of probing electrons
The effect of considering the third dimension in mass concrete members on its cracking behavior is investigated in this study. The investigation includes thermal and structural analyses of mass concrete structures. From thermal analysis, the actual temperature distribution throughout the mass concrete body was obtained due to the generation of heat as a result of cement hydration in addition to the ambient circumstances. This was performed via solving the differential equations of heat conduction and convection using the finite element method. The finite element method was also implemented in the structural analysis adopting the concept of initial strain problem. Drying shrinkage volume changes were calculated using the procedure suggested
... Show MoreThe effect of considering the third dimension in mass concrete members on its cracking behavior is investigated in this study. The investigation includes thermal and structural analyses of mass concrete structures. From thermal analysis, the actual temperature distribution throughout the mass concrete body was obtained due to the generation of heat as a result of cement hydration in
addition to the ambient circumstances. This was performed via solving the differential equations of heat conduction and convection using the finite element method. The finite element method was also implemented in the structural analysis adopting the concept of initial strain problem. Drying shrinkage volume changes were calculated using the procedure sug
In the last decades of the twentieth century, ideas emerged that were increasingly being floated, stating that the planet is suffering from a population explosion, depletion of resources, and environmental problems that require action to be addressed. Although these problems in practice need scientific solutions, the problem is that these solutions collide with ideologies. Here the green political thought emerges, based on the criticism of many ideological axioms. The owners of green thinking agree that most environmental damage is due to the humanist doctrine. It criticizes modernity accompanied by a scientific revolution, where this criticism centered around (the rationality of the scientific and technological mind), here the green pol
... Show MoreIt is through a review of conversion of vegetable oils into glycidyl ethers focusing on their roles in achieving sustainability and improved epoxy resin performance. It involves functionalization of triglycerides in the form of epoxidation followed by glycidylation and yields bio-based monomers having improved mechanical as well as thermal properties. The review covers the underlying chemistry, production drivers, industrial applications, and future issues, supported by quantitative data and comparative studies. In addition, it integrates recent data on catalyst choice, feedstock flexibility, and environmental performance factors of bio-based resins, indicating their suitability for replacing traditional petroleum-based components.<
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show More