Massive multiple-input multiple-output (massive-MIMO) is a promising technology for next generation wireless communications systems due to its capability to increase the data rate and meet the enormous ongoing data traffic explosion. However, in non-reciprocal channels, such as those encountered in frequency division duplex (FDD) systems, channel state information (CSI) estimation using downlink (DL) training sequence is to date very challenging issue, especially when the channel exhibits a shorter coherence time. In particular, the availability of sufficiently accurate CSI at the base transceiver station (BTS) allows an efficient precoding design in the DL transmission to be achieved, and thus, reliable communication systems can be obtained. In order to achieve the aforementioned objectives, this paper presents a feasible DL training sequence design based on a partial CSI estimation approach for an FDD massive-MIMO system with a shorter coherence time. To this end, a threshold-based approach is proposed for a suitable DL pilot selection by exploring the statistical information of the channel covariance matrix. The mean square error of the proposed design is derived, and the achievable sum rate and bit-error-rate for maximum ratio transmitter and regularized zero forcing precoding is investigated over different BTS topologies with uniform linear array and uniform rectangular array. The results show that a feasible performance in the DL FDD massive-MIMO systems can be achieved even when a large number of antenna elements are deployed by the BTS and a shorter coherence time is considered.
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreIn this paper we used frequentist and Bayesian approaches for the linear regression model to predict future observations for unemployment rates in Iraq. Parameters are estimated using the ordinary least squares method and for the Bayesian approach using the Markov Chain Monte Carlo (MCMC) method. Calculations are done using the R program. The analysis showed that the linear regression model using the Bayesian approach is better and can be used as an alternative to the frequentist approach. Two criteria, the root mean square error (RMSE) and the median absolute deviation (MAD) were used to compare the performance of the estimates. The results obtained showed that the unemployment rates will continue to increase in the next two decade
... Show MoreThe research's purpose is to highlight the role that the Approach of the strategic decision play in universities' governorships, assuming that the universities' governorship are definite result that can be reached by modern universities through their active strategic decisions that they take based on the correct way of thinking and the appropriate entrance that achieve the strategic goal of these decisions. The current research depended on two curriculums necessitated by the research requirement which are the analytical description curriculum and compare curriculum, the field research was done in the (Baghdad and Al-Mustansiriya) universities, the samples that were selected were the president, assistants and members of the board'
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreIn this paper, the homotopy perturbation method (HPM) is presented for treating a linear system of second-kind mixed Volterra-Fredholm integral equations. The method is based on constructing the series whose summation is the solution of the considered system. Convergence of constructed series is discussed and its proof is given; also, the error estimation is obtained. Algorithm is suggested and applied on several examples and the results are computed by using MATLAB (R2015a). To show the accuracy of the results and the effectiveness of the method, the approximate solutions of some examples are compared with the exact solution by computing the absolute errors.
In this work, synthesized N4,N4`-bis(2, 3, 4 nitro benzylidene) biphenyi-4-4`-diamine(B1-B3) , was tested as an inhibitors in controlling the corrosion of carbon steel in NaCl 3.5% solution by using open circuit potential (OCP),at four different temperatures (293, 303, 313 and 323 K). Furthermore, the surface morphology was investigated using the Atomic force microscopy (AFM). The effect of using different Schiff bases and temperature was also investigated. Schiff bases was synthesized and characterized via using. Fourier Transform Infrared Spectroscopy (FT-IR)and Atomic Force Microscope (AFM) characterized . The experimental results shown that Schiff bases can consider as an excellent corrosion inhibitors for carbon steel in NaCl 3
... Show MoreThe aim of this research work is to study the effect of stabilizing gypseous soil, which covers vast areas in the middle, west and south parts of Iraq, using liquid asphalt on its strength properties to be used as a base course layer replacing the traditional materials of coarse aggregate and broken stones which are scarce at economical prices and hauling distances. Gypseous soil brought from Al-Ramadi City, west of Iraq, with gypsum content of 66.65%, medium curing cutback asphalt (MC-30), and hydrated lime are used in this study. The conducted tests on untreated and treated gypseous soil with different percentages of medium curing cutback asphalt (MC-30), water, and lime were: unconfined compression strength, and one dimensional confine
... Show MoreThe aim of this research work is to study the effect of stabilizing gypseous soil, which covers
vast areas in the middle, west and south parts of Iraq, using liquid asphalt on its strength properties
to be used as a base course layer replacing the traditional materials of coarse aggregate and broken
stones which are scarce at economical prices and hauling distances.
Gypseous soil brought from Al-Ramadi City, west of Iraq, with gypsum content of 66.65%,
medium curing cutback asphalt (MC-30), and hydrated lime are used in this study.
The conducted tests on untreated and treated gypseous soil with different percentages of medium
curing cutback asphalt (MC-30), water, and lime were: unconfined compression strength, and o
In this work, optical system with different aperture shapes (circular, square, elliptical and triangle aperture) has been used for efficiency evaluation when the system involved moving factor in ideal case (aberration free). The optical system evaluate far moving object, therefore the image forming at image plane due to point spread function (image formula of incoherently illuminated point object). A mathematical treatment has been used to getting results by Gaussian numerical calculations method. The results show priority of circular aperture when optical system that submits of moving factor.