Preferred Language
Articles
/
alkej-350
Proposed Hybrid Sparse Adaptive Algorithms for System Identification
...Show More Authors

Abstract 

For sparse system identification,recent suggested algorithms are  -norm Least Mean Square (  -LMS), Zero-Attracting LMS (ZA-LMS), Reweighted Zero-Attracting LMS (RZA-LMS), and p-norm LMS (p-LMS) algorithms, that have modified the cost function of the conventional LMS algorithm by adding a constraint of coefficients sparsity. And so, the proposed algorithms are named  -ZA-LMS,  -RZA-LMS, p-ZA-LMS and p-RZA-LMS that are designed by merging twoconstraints from previous algorithms to improve theconvergence rate and steady state of MSD for sparse system. In this paper, a complete analysis was done for the theoretical operation of proposed algorithms by exited white Gaussian sequence for input signal. The discussion of mean square deviation (MSD) with regard to parameters of algorithms and system sparsity was observed. In addition, in this paper, the correlation between proposed algorithms and the last recent algorithms were presented and the necessary conditions of these proposed algorithms were planned to improve convergence rate. Finally, the results of simulations are compared with theoretical study (?), which is presented to match closely by a wide-range of parameters..

Keywords: Adaptive filter,  -LMS, zero-attracting, p-LMS, mean square deviation, Sparse system identification.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 30 2003
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Mathematical Model for Multicomponent Distillation Column
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Spectral Technique for Baud Time Estimation
...Show More Authors

A new approach for baud time (or baud rate) estimation of a random binary signal is presented. This approach utilizes the spectrum of the signal after nonlinear processing in a way that the estimation error can be reduced by simply increasing the number of the processed samples instead of increasing the sampling rate. The spectrum of the new signal is shown to give an accurate estimate about the baud time when there is no apriory information or any restricting preassumptions. The performance of the estimator for random binary square waves perturbed by white Gaussian noise and ISI is evaluated and compared with that of the conventional estimator of the zero crossing detector.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Apr 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Result for the group SL(2,172)
...Show More Authors

Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Nahrwan Clays Study for Brick Industry
...Show More Authors

Nahrawan clay deposits lies in Diyala governorate , 65 Km, NE of Baghdad , according to the previous work in this field, in which they study the reserve belong to category of investigation ( C2 & C1 ) , we choice the proper area to investigation of category (B) with drill net( 200x 200m ) to rise the amount of reserve. The investigation work included drilling (116) boreholes of total depth ranges from (10.0-12.55m) , showed mainly clayey and silty deposits with little sand , and the typical borehole (648) represents all types of sediment in the area , and most of boreholes without sandy deposits , and all of these deposits is Quaternary sediment which is consist of two main sedimentary cycles ( the Pleistocene & Holocene ) . Chemical a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Manufacturing electrolysis cell for hydrogen production
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
Wavelet Analysis For Sunspot Time Series
...Show More Authors

Abstract

In this research we study the wavelet characteristics for the important time series known as Sunspot, on the aim of verifying the periodogram that other researchers had reached by the spectral transform, and noticing the variation in the period length on one side and the shifting on another.

A continuous wavelet analysis is done for this series and the periodogram in it is marked primarily. for more accuracy, the series is partitioned to its the approximate and the details components to five levels, filtering these components by using fixed threshold on one time and independent threshold on another, finding the noise series which represents the difference between

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Social enhancement for the kindergarten teachers
...Show More Authors

          The she/teacher is considered one of the basics of the educational process for its essential role in education and teaching the kindergarten child, thus  its lack to construct social relations in side the kindergarten environment working in it regarded one of the shortcoming factors she is suffering from which should be manipulated, because it could effect its enthusiasm to work in the kindergarten according to what has mentioned, the researcher presents the following objective:-

 

  • Identifying level of social enhancement for the kindergarten teachers via the test of the following hypothesis:-

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Optical Properties for SeTe Thin Films
...Show More Authors

Chalcogenide glasses SeTe have been prepared from the high purity constituent elements .Thin films of SeTe compound have been deposited by thermal evaporation onto glass substrates for different values of film thickness . The effect of varying thickness on the value of the optical gap is reported . The resultant films were in amorphous nature . The transmittance spectra was measured for that films in the wavelength range (400-1100) nm . The energy gap for such films was determined .

View Publication Preview PDF
Crossref (1)
Crossref