The objective of this study was tointroduce a recursive least squares (RLS) parameter estimatorenhanced by using a neural network (NN) to facilitate the computing of a bit error rate (BER) (error reduction) during channels estimation of a multiple input-multiple output orthogonal frequency division multiplexing (MIMO-OFDM) system over a Rayleigh multipath fading channel.Recursive least square is an efficient approach to neural network training:first, the neural network estimator learns to adapt to the channel variations then it estimates the channel frequency response. Simulation results show that the proposed method has better performance compared to the conventional methods least square (LS) and the original RLS and it is more robust at high speed mobility.
Abstract
The aim of the current research is to prepare an integrated learning program based on mathematics standards for the next generation of the NYS and to investigate its impact on the development of the teaching performance of middle school mathematics teachers and the future thinking skills of their students. To achieve the objectives of the research, the researcher prepared a list of mathematics standards for the next generation, which were derived from a list of standards. He also prepared a list of the teaching competencies required for middle school mathematics teachers in light of the list of standards, as well as clarified the foundations of the training program and its objectives and the mathematical
... Show MoreThe research aims to determine the impact of Human Resources Accounting (HRA) on employee’s performance. The research’s problem was embodied in the lack of interest in HRA, which was reflected on the performance of employees in the Ministry of Education; the research adopted the descriptive-analytical approach, and the research community included the directors of departments and people at the headquarters of the Ministry of Education. The sample size was (224) individuals from the total community of 533. The questionnaire was adopted as the main tool for collecting data and information, as well as the interviews that were conducted by the researcher. In order to analyze t
... Show MoreIn this research the hard chromium electroplating process, which is one of the common methods of overlay coating was used, by using chromium acid as source of chromium and sulphuric acid as catalyst since the ratio between chromic acid and sulphuric acid is (100 : 1) consequently. Plating process was made by applying current of density (40 Amp / dm2) and the range of solution temperature was (50 – 55oC) with different time periods (1-5 hr). A low carbon steel type (Ck15) was used as substrate for hard chromium electroplating. Solid carburization was carried out for hard chromium plating specimen at temperature (925oC) with time duration (2 hr) to be followed with quenching and tempering
... Show MoreIncreased diseases and obesity currently due to increased production and excessive consumption of foods manufactured from non-food sweeteners without attention to the risk of consuming those additional high calories due to consuming these refreshing products such as juices and other various drinks, especially in the summer season by most segments of Iraqi society, especially workers, children and school students the aim of this study. Therefore, the study designed to replace sucrose with 0.03, 0.04 and 0.05% of each of the white stevia crystals and milled dry stevia leaves in the laboratory manufacture of juices and its effect on the general and sensory characteristics and the extent of their acceptability among the specialized r
... Show MoreAbstract
The catalytic cracking conversion of Iraqi vacuum gas oil was studied on large and medium pore size (HY, HX, ZSM-22 and ZSM-11) of zeolite catalysts. These catalysts were prepared locally and used in the present work. The catalytic conversion performed on a continuous fixed-bed laboratory reaction unit. Experiments were performed in the temperature range of 673 to 823K, pressure range of 3 to 15bar, and LHSV range of 0.5-3h-1. The results show that the catalytic conversion of vacuum gas oil increases with increase in reaction temperature and decreases with increase in LHSV. The catalytic activity for the proposed catalysts arranged in the following order:
HY>H
... Show MoreAbstract
Hexapod robot is a flexible mechanical robot with six legs. It has the ability to walk over terrain. The hexapod robot look likes the insect so it has the same gaits. These gaits are tripod, wave and ripple gaits. Hexapod robot needs to stay statically stable at all the times during each gait in order not to fall with three or more legs continuously contacts with the ground. The safety static stability walking is called (the stability margin). In this paper, the forward and inverse kinematics are derived for each hexapod’s leg in order to simulate the hexapod robot model walking using MATLAB R2010a for all gaits and the geometry in order to derive the equations of the sub-constraint workspaces for each
... Show MoreBackground/objectives: To study the motion equation under all perturbations effect for Low Earth Orbit (LEO) satellite. Predicting a satellite’s orbit is an important part of mission exploration. Methodology: Using 4th order Runge–Kutta’s method this equation was integrated numerically. In this study, the accurate perturbed value of orbital elements was calculated by using sub-steps number m during one revolution, also different step numbers nnn during 400 revolutions. The predication algorithm was applied and orbital elements changing were analyzed. The satellite in LEO influences by drag more than other perturbations regardless nnn through semi-major axis and eccentricity reducing. Findings and novelty/improvement: The results demo
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More