<span lang="EN-US">The fundamental of a downlink massive multiple-input multiple-output (MIMO) energy- issue efficiency strategy is known as minimum mean squared error (MMSE) implementation degrades the performance of a downlink massive MIMO energy-efficiency scheme, so some improvements are adding for this precoding scheme to improve its workthat is called our proposal solution as a proposed improved MMSE precoder (PIMP). The energy efficiency (EE) study has also taken into mind drastically lowering radiated power while maintaining high throughput and minimizing interference issues. We further find the tradeoff between spectral efficiency (SE) and EE although they coincide at the beginning but later their interests become conflicting and divergent then leading EE to decrease so gradually while SE continues increasing logarithmically. The results achieved that for a single-cellular massive MU-MIMO downlink model, our PIMP scheme is the appropriate scenario to achieve higher precoding performance system. Furthermore, both maximum ratio transmission (MRT) and PIMP are suitable for performance improvement in massive MIMO results of EE and SE. So, the main contribution comes with this work that highest EE and SE are belong to use a PIMP which performs better appreciably than MRT at bigger ratio of number of antennas to the number of the users. </span>
Le professeur Taranne et La non-Communication
The current study aimed at (identifying the impact of a proposed strategy based on the realistic mathematics theory in the mathematical interrelation among the third intermediate grade students), two samples from the third intermediate grade were tested in a school affiliated to Rusafa I General education Directorate in Baghdad for the academic year (2022-2021)the experimental group will study according to the proposed strategy and it consisted of (30) female students , the control group will study through the traditional method and the number of its students is (30), thus the study sample consisted of (60) female students, the two groups were equalized in the variables (age in months, intelligence, prior knowledge) and to achieve the study
... Show MoreIn this work the effect of choosing tri-circular tube section had been addressed to minimize the end effector’s error, a comparison had been made between the tri-tube section and the traditional square cross section for a robot arm, the study shows that for the same weight of square section and tri-tube section the error may be reduced by about 33%.
A program had been built up by the use of MathCAD software to calculate the minimum weight of a square section robot arm that could with stand a given pay load and gives a minimum deflection. The second part of the program makes an optimization process for the dimension of the cross section and gives the dimensions of the tri-circular tube cross section that have the same weight of
... Show MoreThis work represents implementation and investigation of optical coherent communication system between two computers. A single mode optical fiber is selected as transmission medium. The data are sent via the RS-232 standard interface with a bit rate of 9.6 kbps from personal computer (PC1) by line receive to convert the data from electrical levels (-12/+12 V) into TTL level (0/5 V). The modulation of this data was accomplished by internal modulation using laser diode type (HFCT-5208M) 1310 nm wavelength. The optical D-coupler was used to combine the optical signal that come from laser source with optical signal of laser local oscillator (OTS-304XI) at 1310/1550 nm wavelength to obtain coherent (homodyne and heterodyne) detection respective
... Show MoreThe digital communication of a product of communication and information revolution. It is characterized by accurate and comprehensive in its services and its effects, which brought changes in the structure of many communities and their organizational structures. They have significant impacts on the social systems and social relations, especially in the Arab societies, which are the focus of the globalized Western media, for many reasons: economical, political , cultural and social.
According to this perception, the Arab identity has become in an encounter with big challenges by the globalized media of trade and the media, which aims to achieve greater profits because of identity and its importance to the communities. This occurs par
The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra
... Show MoreHusbands’ violence towards their wives is one of the greatly important issues in social sciences. Accordingly, the current study aims at determining the levels of violence practiced by husbands towards their wives to propose a professional program from the perspective of the general practice of social work to overcome such a phenomenon. The study is descriptive in nature, where the researcher has used a comprehensive social survey method. To achieve the goal of the study, the researcher has prepared a questionnaire that consisted of two parts. The first part contains the primary data of the two sections, and the second contains (38) phrases distributed over four axes to measure the levels and types of violence among the sample’s memb
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show More