This paper describes a number of new interleaving strategies based on the golden section. The new interleavers are called golden relative prime interleavers, golden interleavers, and dithered golden interleavers. The latter two approaches involve sorting a real-valued vector derived from the golden section. Random and so-called “spread” interleavers are also considered. Turbo-code performance results are presented and compared for the various interleaving strategies. Of the interleavers considered, the dithered golden interleaver typically provides the best performance, especially for low code rates and large block sizes. The golden relative prime interleaver is shown to work surprisingly well for high puncture rates. These interleavers have excellent spreading properties in general and are thus useful for many applications other than Turbo-codes.
Was appointed acid steady disintegration of organic EkandThe results proved that organic Allicand acting and Konnh solid baseBy Tgrav Pearson has possible account Maamat hardness and softness of organic Ekand
Plastic soil exhibits unfavorited geotechnical properties (when saturation), which causes negative defects to engineering structures. Different attempts (included various materials) were conducted to proffer solutions to such defects by experimenting in practical ways. On one hand, these attempts aimed to improve the engineering characteristics of plastic soil, and on the other hand, to use problematic waste materials as a stabilizer, like cement kiln dust, and to reduce environmental hazards. This paper explored the shrinkage, plasticity, and strength behavior of plastic soil enhanced with cement dust. The cement dust contents were 0%, 5%, 10%, 15% and 20% by dry weight of soil. An experimental series of shrinkage and p
... Show MoreCerium (III), Neodymium (III) and Samarium (III) Complexes existent a wide range of implementation that stretch from their play in the medicinal and pharmaceutical area because of their major significant pharmacological characteristic such as antifungal, anti-cancer, anti-bacterial ,anti-human immunodeficiency virus ,antineoplastic, anti-inflammation,inhibition corrosion,in some industrial (polymers, Azo dye).It is likely to open avenuesto research among various disciplines such as physics, electronics, chemistry and materials science by these complexes that contain exquisitely designed organic molecules.This paper reviews the definition, importance and various applications of Cerium (III), Neodymium (III) and Samarium (III) Complexes anddi
... Show MoreCerium (III), Neodymium (III) and Samarium (III) Complexes existent a wide range of implementation that stretch from their play in the medicinal and pharmaceutical area because of their major significant pharmacological characteristic such as antifungal, anti-cancer, anti-bacterial ,anti-human immunodeficiency virus ,antineoplastic, anti-inflammation,inhibition corrosion,in some industrial (polymers, Azo dye).It is likely to open avenuesto research among various disciplines such as physics, electronics, chemistry and materials science by these complexes that contain exquisitely designed organic molecules.This paper reviews the definition, importance and various applications of Cerium (III), Neodymium (III) and Samarium (III) Complexe
... Show MoreThe aim of the research is to identify psychological toughness and its relationship to some coordination, physical abilities and accuracy of some basic performance skills among the players of the Iraqi junior national handball team players. The hypothesis is the existence of a correlation between psychological toughness, coordination, physical abilities, and the accuracy of some basic skills performance among the players of the Iraqi junior national handball team players. The descriptive approach in the style of correlational relations used to suit the research problem, as the community was determined by (18) players for the Iraqi junior national handball team players, while the sample was (14) players, and the samp
... Show MoreThe consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen
... Show MoreThis study aimed to determine the level of spiritual intelligence among students of educational psychology course at the Jerash University. and whether this level of varies depend on the gender of the student as well as the college type. The study sample consisted of (180) male and female students of bachelor students at the University Jerash, in the second semester of academic year2014-2015. The main results of the study were that the level of spiritual
Intelligence of Jerash University students was high. More over There were no statistically significant differences at the level of significance (0.05) due to the effect of gender, college type or academic achievement
The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show More