Abstract
The Phenomenon of Extremism of Values (Maximum or Rare Value) an important phenomenon is the use of two techniques of sampling techniques to deal with this Extremism: the technique of the peak sample and the maximum annual sampling technique (AM) (Extreme values, Gumbel) for sample (AM) and (general Pareto, exponential) distribution of the POT sample. The cross-entropy algorithm was applied in two of its methods to the first estimate using the statistical order and the second using the statistical order and likelihood ratio. The third method is proposed by the researcher. The MSE comparison coefficient of the estimated parameters and the probability density function for each of the distributions were
... Show MoreIn cognitive radio system, the spectrum sensing has a major challenge in needing a sensing method, which has a high detection capability with reduced complexity. In this paper, a low-cost hybrid spectrum sensing method with an optimized detection performance based on energy and cyclostationary detectors is proposed. The method is designed such that at high signal-to-noise ratio SNR values, energy detector is used alone to perform the detection. At low SNR values, cyclostationary detector with reduced complexity may be employed to support the accurate detection. The complexity reduction is done in two ways: through reducing the number of sensing samples used in the autocorrelation process in the time domain and through using the Slid
... Show MoreText based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.
... Show MoreZinc oxide (ZnO) transparent thin films with different oxygen flow rates (0.5, 1.0, and 1.5)Litter/min. were prepared by thermal evaporation technique on glass substrate at a temperature of 200℃ with rate (10±2)nm sec-1, The crystallinity and structure of these films were analyzed by X-ray diffraction (XRD). It exhibits a polycrystalline hexagonal wurtzite structure and the preferred orientation along (002) plane. The Optical properties of ZnO were determined through the optical transmission method using ulta violet–Visible spectrophotometer with in wave length (300-1100)nm. The optical transmittance of the ZnO films increases from 75% to 85% with increase flow rate of O2, and the optical band gap of ZnO
... Show MoreTMA Technique was used to study the behavior of the thermal expansion (α) of the unsaturated polyester resin(UP) containing ratios wt % of different phenolic Bakelite. We can through this technique evaluate the coefficient of linear thermal expansion (α) on the one hand and the glass transition temperature(Tg) of his other hand of polymer composite prepared .Evidenced from this study that extravagant increases the ratio of phenolic Bakelite in polyester prepared led to a decrease in the Tg and it was observed that there is increase in the values of (α) in low temperture and decrease in high temperture due to transformation of polymeric material from elastic to plastic , and therefore, increase the ratio to 15% phenoli
... Show MoreThe science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera
... Show MoreThe aim of this paper is determine the concentration of the organic oxygen in some organic compounds (Aldehydes ) by the derivative neutron activation analysis technique, and the derivative of the oxygen by the nitrogen equivalent toit and the irradiation of anew sample in flounce (1.73*106 n.cm-2.s-1) by the neutron generator .Then the calculation of the radioactivity which is done by using NaI(Tl) . After that we determine the concentration of nitrogen by calibration curve that includes nitrogen compounds which have apparent chemical and physical characteristics .For comparison the result is done by using keldal method.