The employment of cognitive radio (CR) is critical to the successful development of wireless communications. In this field, especially when using the multiple input multiple output (MIMO) antenna technology, energy consumption is critical. If the principal user (PU) is present, developers can utilize the energy detecting approach to tell. The researchers employed two distinct phases to conduct their research: the intense and accurate sensing stages. After the furious sensing step was completed, the PU user was identified as having a maximum or minimal energy channel. There are two situations in which the proposed algorithm's performance is tested: channels for fading AWGN and Rayleigh. When the proposed methods' simulation results a
... Show MoreMany studies have focused on identifying and classifying freshwater fishes in Iraq, concerned with describing, organizing, and drawing up a list of freshwater fishes in Iraq or the Tigris and Euphrates rivers. Within the most recent updates at the beginning of 2023, 53 native freshwater and 20 exotic (alien or introduced) fish species are recorded and described. This study reviewed the database of morphology and molecular studies of freshwater fish in Iraq and reported species while surveying the fish fauna at different water bodies of the country from 2010 to the beginning of 2023. In conclusion, 29 species (about 40.3%) of all 72 fish species in Iraq still need to be available information on their molecular data.
The effect of three ionic liquids viz., 1-hexyl-3-methylimidazolium tetrafluoroborate (ILE), 1-hexyl-3-metylimidazolium hexafluorophosphate (ILF) and 1-octyl-3-methylimidazolium tetrafluoroborate (ILG) when used as surfactants on the performance of dissolved air floatation (DAF) was investigated.
Experiments were conducted at a temperature of 30-35 ºC, 10ppm ferric chloride as coagulant, 50% recycle ratio, pH 8, and 10 minutes treatment time to find oil and grease (OG) and turbidity removal efficiencies at saturation pressure (2-6) bar.
ILs were used at concentration of 50 µl/liter of treated water in two positions in DAF system; the saturation vessel and the treatment tank. The performance using ILs
... Show MoreThis study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially th
... Show MoreLead-acid batteries have been used increasingly in recent years in solar power systems, especially in homes and small businesses, due to their cheapness and advanced development in manufacturing them. However, these batteries have low voltages and low capacities, to increase voltage and capacities, they need to be connected in series and parallel. Whether they are connected in series or parallel, their voltages and capacities must be equal otherwise the quality of service will be degraded. The fact that these different voltages are inherent in their manufacturing, but these unbalanced voltages can be controlled. Using a switched capacitor is a method that was used in many methods for balancing voltages, but their respons
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreThe study aimed to prepare quick response codes to learn some of the technical skills of the second graders in the Faculty of Physical Education and Sports Sciences. The experimental method was used in the design of the experimental and control experimental and control groups. The research sample was represented by second-graders in the College of Physical Education and Sports Sciences / University of Baghdad, and by lot, the second division (a) was chosen to represent the experimental group that applied the inverse method using the QR code, and the second division (g) to represent the control group and applied the traditional method. (10) Students per group. After the tribal tests, his main experiment was carried out for 10 weeks with one
... Show MoreThe study aimed to prepare quick response codes to learn some of the technical skills of the second graders in the Faculty of Physical Education and Sports Sciences. The experimental method was used in the design of the experimental and control experimental and control groups. The research sample was represented by second-graders in the College of Physical Education and Sports Sciences / University of Baghdad, and by lot, the second division (a) was chosen to represent the experimental group that applied the inverse method using the QR code, and the second division (g) to represent the control group and applied the traditional method. (10) Students per group. After the tribal tests, his main experiment was carried out for 10 weeks with one
... Show More