Preferred Language
Articles
/
alkej-285
A Comparison Between Recursive Least-Squares (RLS) and Extended Recursive Least-Squares (E-RLS) for Tracking Multiple Fast Time Variation Rayleigh Fading Channel

In order to select the optimal tracking of fast time variation of multipath fast time variation Rayleigh fading channel, this paper focuses on the recursive least-squares (RLS) and Extended recursive least-squares (E-RLS) algorithms and reaches the conclusion that E-RLS is more feasible according to the comparison output of the simulation program from tracking performance and mean square error over five fast time variation of Rayleigh fading channels and more than one time (send/receive) reach to 100 times to make sure from efficiency of these algorithms.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
The use of the Principal components and Partial least squares methods to estimate the parameters of the logistic regression model in the case of linear multiplication problem

Abstract

  The logistic regression model is one of the nonlinear models that aims at obtaining highly efficient capabilities, It also the researcher an idea of the effect of the explanatory variable on the binary response variable.                                                                                  &nb

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Oct 01 2013
Journal Name
Radioelectronics And Communications Systems
BER performance enhancement for secure wireless communication systems based on DCSK-MIMO techniques under Rayleigh fading channel

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (

... Show More
Scopus Crossref
View Publication
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Comparison between the BEKK and DVECH Models of Multivariate GARCH Models with Practical Application

The Purpose of this research is a comparison between two types of multivariate GARCH models BEKK and DVECH to forecast using financial time series which are the series of daily Iraqi dinar exchange rate with dollar, the global daily of Oil price with dollar and the global daily of gold price with dollar for the period from 01/01/2014 till 01/01/2016.The estimation, testing and forecasting process has been computed through the program RATS. Three time series have been transferred to the three asset returns to get the Stationarity, some tests were conducted including Ljung- Box, Multivariate Q and Multivariate ARCH to Returns Series and Residuals Series for both models with comparison between the estimation and for

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Nov 01 2013
Journal Name
Radioelectronics And Communications Systems
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed

... Show More
Scopus Crossref
View Publication
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of the Shapiro-Wilk test Jureckova test using simulation and multiple distributions

 إن المقصود باختبارات حسن المطابقة هو التحقق من فرضية العدم القائمة على تطابق مشاهدات أية عينة تحت الدراسة لتوزيع احتمالي معين وترد مثل هكذا حالات في التطبيق العملي بكثرة وفي كافة المجالات وعلى الأخص بحوث علم الوراثة والبحوث الطبية والبحوث الحياتية ,عندما اقترح كلا من   Shapiro والعالم Wilk  عام 1965 اختبار حسن المطابقة الحدسي مع معالم القياس
(

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison between robust methods in canonical correlation by using empirical influence function

       Canonical correlation analysis is one of the common methods for analyzing data and know the relationship between two sets of variables under study, as it depends on the process of analyzing the variance matrix or the correlation matrix. Researchers resort to the use of many methods to estimate canonical correlation (CC); some are biased for outliers, and others are resistant to those values; in addition, there are standards that check the efficiency of estimation methods.

In our research, we dealt with robust estimation methods that depend on the correlation matrix in the analysis process to obtain a robust canonical correlation coefficient, which is the method of Biwe

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Apr 02 2017
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Comparison study between the treatment of Hepatitis C virus with (peg-interferon, ribavirin, silymarin) and (peg-interferon, ribavirin) in Baghdad teaching hospital.

Background: Infection with Hepatitis C virus (HCV) is a major cause of chronic liver disease, WHO estimated that about 170 million people are infected with Hepatitic C virus, Silymarin (Legalon) have been recently shown to be effective in treatment of Hepatitic C virus infection.
Objectives: The effectiveness of Legalon (Silymarin) on viral load in patients with Hepatitic C virus infection.
Patients and methods: A prospective case – control study included 400 patients with Hepatitis C virus infection. 200 patients (group A) were treated with (peg-interferon, ribavirin, silymarin) the other 200 patients (group B) were treated with (peg-interferon, ribavirin) . only G1 & G4 genotypes were included , viral load were assessed ini

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and

... Show More
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
A Comparison Between Two Shape Parameters Estimators for (Burr-XII) Distribution

This paper deals with defining Burr-XII, and how to obtain its p.d.f., and CDF, since this distribution is one of failure distribution which is compound distribution from two failure models which are Gamma model and weibull model. Some equipment may have many important parts and the probability distributions representing which may be of different types, so found that Burr by its different compound formulas is the best model to be studied, and estimated its parameter to compute the mean time to failure rate. Here Burr-XII rather than other models is consider  because it is used to model a wide variety of phenomena including crop prices, household income, option market price distributions, risk and travel time. It has two shape-parame

... Show More
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sun May 12 2019
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Comparison of proton density MRI and T2-Weighted Fast Echo for The Detection of Cervical Spinal Cord Multiple Sclerosis Lesions

Background: The prevalence of spinal cord lesions is high in multiple sclerosis particularly in the cervical cord, and their detection can assist in both the diagnosis and follow-up of the patients. For spinal multiple sclerosis, MRI is considered the first line investigation.

Objective: To evaluate the value of sagittal 1.5 Tesla proton density-fast spin echo (PD-FSE) MRI in the detecting and increasing conspicuity of multiple sclerosis lesions in cervical cord in comparison with sagittal T2 fast spin-echo (T2-FSE) MRI.

Patients and Methods: A cross sectional study carried out from 3rd of January 2017 to 1st of January 2018 in the MRI department of

... Show More
Crossref
View Publication Preview PDF