Preferred Language
Articles
/
Qhd8V5IBVTCNdQwCHaw6
Variable length error correcting code for image in OFDM and PAPR reduction
...Show More Authors

Data <span>transmission in orthogonal frequency division multiplexing (OFDM) system needs source and channel coding, the transmitted data suffers from the bad effect of large peak to average power ratio (PAPR). Source code and channel codes can be joined using different joined codes. Variable length error correcting code (VLEC) is one of these joined codes. VLEC is used in mat lab simulation for image transmission in OFDM system, different VLEC code length is used and compared to find that the PAPR decreased with increasing the code length. Several techniques are used and compared for PAPR reduction. The PAPR of OFDM signal is measured for image coding with VLEC and compared with image coded by Huffman source coding and Bose-Chaudhuri-Hochquenghem (BCH) channel coding, the VLEC code decreases the data transmitted size and keep the same level of PAPR reduction with respect to data coded by Huffman and BCH code when using PAPR reduction methods.</span>

Scopus Crossref
View Publication
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
Reflective Mercifulness and its Implications for Social Cohesion / field study in Baghdad Governorate
...Show More Authors

Mercifulness is a trait of civilization, humanity, and a moral value in society, because it has an impact on social life and its role in spreading interdependence, joint liability, and solidarity among people. Mercifulness means spreading mercy, synergy, sympathy, and cooperation. Generally, a society that enjoys strong ties tends to have a kind of stability and development, as well as, is able to face the economic, political, and security crises. Conversely, a weak society leads to weak social cohesion and weak community infrastructure that is more vulnerable to social, economic, and political instability. Thus, this is the aim of the research that has used a social survey method applied to a sample of respondents who have reached (300)

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Research Journal Of Pharmacy And Technology
Estimating the plain and negative tendonography techniques for evaluating injured tendon in rabbit
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Suggestive Framework for Applying Performance and Programs Budget in Iraqi Government Units Environment
...Show More Authors

Abstract

This research  aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This  is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 01 2025
Journal Name
South African Journal Of Chemical Engineering
Expired azithromycin and cephalexin as corrosion inhibitors for aluminum in saline-acidic solution
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Fri Nov 02 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Psychological Problems for Institutionalized and Noninstitutionalized Geriatric People in Baghdad City
...Show More Authors

objective : To assess for Psychological Problems. The study was carried out from 1st of December 2004 to 15th
March, 2005.
Mythology : A descriptive comparative study was conducted for elder in the geriatric home and the community;
A questionnaire was constructed to achieve the purposes of the study; it includes two parts dealing with the
elder demographic characteristics and psychological problems.
A purposive (no probability) sampling of (100) elderly include (50) elderly from the Geriatric Home and (50)
elderly from the community.
Data were collected and analyzed through a descriptive statistical approach (frequency, percentage, mean and
mean of scores, Standard deviation, Relative Sufficiency).
Result : the

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Batch and flow injection spectrophotometric methods for determination of Ceftazidime in pharmaceutical formulations
...Show More Authors

It is generally accepted that there are two spectrophotometric techniques for quantifying ceftazidime (CFT) in bulk medications and pharmaceutical formulations.  The methods  are described as simple, sensitive, selective, accurate and efficient techniques. The first method used an alkaline medium to convert ceftazidime to its diazonium salt, which is then combined with the 1-Naphthol (1-NPT) and 2-Naphthol (2-NPT) reagents. The azo dye that was produced brown  and red in color with absorption intensities of ƛmax 585 and 545nm respectively. Beer's law was followed in terms of concentration ranging from  (3-40) µg .ml-1 For (CFT-1-NPT) and (CFT-2-NPT), the detection limits were 1.0096 and 0.8017 µg.ml-1, respec

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Tue Feb 02 2010
Journal Name
Advances In Software Engineering
A Strategy for Automatic Quality Signing and Verification Processes for Hardware and Software Testing
...Show More Authors

We propose a novel strategy to optimize the test suite required for testing both hardware and software in a production line. Here, the strategy is based on two processes: Quality Signing Process and Quality Verification Process, respectively. Unlike earlier work, the proposed strategy is based on integration of black box and white box techniques in order to derive an optimum test suite during the Quality Signing Process. In this case, the generated optimal test suite significantly improves the Quality Verification Process. Considering both processes, the novelty of the proposed strategy is the fact that the optimization and reduction of test suite is performed by selecting only mutant killing test cases from cumulating t-way test ca

... Show More
View Publication
Crossref (7)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Schultz and Modified Schultz Polynomials for Edge – Identification Chain and Ring – for Square Graphs
...Show More Authors

In a connected graph , the distance function between each pair of two vertices from a set vertex  is the shortest distance between them and the vertex degree  denoted by  is the number of edges which are incident to the vertex  The Schultz and modified Schultz polynomials of  are have defined as:

 respectively, where the summations are taken over all unordered pairs of distinct vertices in  and  is the distance between  and  in  The general forms of Schultz and modified Schultz polynomials shall be found and indices of the edge – identification chain and ring – square graphs in the present work.

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
Bifurcation and Stability Analysis of Stagnation Point for Fluid Flow in an Inclined Channel with Inclined Magnetic Field for Peristaltic Transport
...Show More Authors

Streamlined peristaltic transport patterns, bifurcations of equilibrium points, and effects of an inclined magnetic field and channel are shown in this study. The incompressible fluid has been the subject of the model's investigation. The Reynolds values for evanescence and an infinite wavelength are used to constrain the flow while it is being studied in a slanted channel with a slanted magnetic field. The topologies over their domestic and cosmopolitan bifurcations are investigated for the outcomes, and notion of the dynamical system are employed. The Mathematica software is used to solve the nonlinear autonomous system. The flow is found to have three different flow distributions namely augmented, trapping and backward flow. Outc

... Show More
View Publication Preview PDF
Scopus Crossref