This study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise Jaccard index of the membership of the multipaths to their clusters. The multipaths generated by C2CM were transformed using the directional cosine transform (DCT) and the whitening transform (WT). The transformed dataset was clustered using SC and 3CAM-SC. The clustering performance was validated using the Jaccard index by comparing the reference multipath dataset with the calculated multipath clusters. The results show that the effectiveness of SC is similar to the state-of-the-art clustering approaches. However, 3CAM-SC outperforms SC in all channel scenarios. SC can be used in indoor scenarios based on accuracy, while 3CAM-SC is applicable in indoor and semi-urban scenarios. Thus, the clustering approaches can be applied as alternative clustering techniques in the field of channel modeling.
Maxim Gorky’s Mother is one of the most important literary genre in social realism, in which he depicts female characters with revolutionary fervor and enthusiasm, projecting his social ideologies and dreams. Though the novel unique importance lies in the fact that it has been thoroughly analyzed by many writers, historians and sociologists, there are almost no studies devoted to the role of women out of a Marxist and feminist point of view. The present paper sheds light on the Russian woman‘s important role in overcoming all adversity and gain her position on Social Realism.
Одно из центральных мест сре
... Show MoreBackground: Tumor necrosis factor-alpha (TNF-α) and interleukins play important roles in the pathogenesis of rheumatoid arthritis (RA). Genetic research has been employed to find many of the missing connections between genetic risk variations and causal genetic components. Objective: The goal of this study is to look at the genetic variations of TNF-α and interleukins in Iraqi RA patients and see how they relate to disease severity or response to biological therapy. Method: Using specific keywords, the authors conducted a systematic and comprehensive search to identify relevant Iraqi studies examining the genetic variations of TNF-α and interleukins in Iraqi RA patients and how they relate to disease severity or response to biolo
... Show More: Summary Iraq suffered under the British administration during the First World War and its entry into an occupation of economic backwardness, and this economic backwardness was linked to the phenomenon of linking Iraq economically to the capitalist world by keeping it as a source of raw materials and a market for capitalist goods, and that the occupation authorities controlled Iraq's economic goods and wealth and mocked them to serve its interests and achieve their political and economic goals that it drew before the war.
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreThe study of economic growth indicators is of fundamental importance in estimating the effectiveness of economic development plans, as well as the great role it plays in determining appropriate economic policies in order to optimally use the factors that lead to the dynamics of growth in Iraq, especially during a certain period of time. The gross domestic product (GDP) at current prices), which is considered a part of the national accounts, which is considered as an integrated dynamic of statistics that produces in front of policy makers the possibility of determining whether the economy is witnessing a state of expansion or evaluating economic activity and its efficiency in order to reach the size of the overall economy. The research aims
... Show MoreDue to the importance of the extraction process in many engineering and medical industries, in addition to great interest in medicinal plants, in this research, microwave-assisted extraction has been applied to extract some active compounds from Rosmarinus officinalis leaves. The optimal extraction conditions were then determined by calculating the ratio and extraction efficiency. The process has also been described through kinetic study by applying five kinetic models, the Hyperbolic diffusion model, Power low model, the First order reaction model, Elovich's model, and Fick's second law diffusion model and determining their compatibility with the studies operation, and determining the kinetic constants for each model. The result
... Show MoreThe issue of the research lies in the non-representation of the models developed for the communication process in the interaction and networking processes through social media, as the research sought to build a network model of communication according to the specific data and features of social media platforms in order to reach a special generalization to understand how the process of networking operates in cyberspace.
The researcher followed the analytical survey approach as she described the communication models outwardly in order to be able to build a networked communication model that represents the flow of post-reactive communication. Therefore, it has been named "Nebula - Sadeem" after the concept of post-space and cosmic g
... Show MoreWhen embankment is constructed on very soft soil, special construction methods are adopted. One of the techniques is a piled embankment. Piled (stone columns) embankments provide an economic and effective solution to the problem of constructing embankments over soft soils. This method can reduce settlements, construction time and cost. Stone columns provide an effective improvement method for soft soils under light structures such as rail or road embankments. The present work investigates the behavior of the embankment models resting on soft soil reinforced with stone columns. Model tests were performed with different spacing distances between stone columns and two lengths to diameter ratios of the stone columns, in addition to different
... Show More
Predicting peterophysical parameters and doing accurate geological modeling which are an active research area in petroleum industry cannot be done accurately unless the reservoir formations are classified into sub-groups. Also, getting core samples from all wells and characterize them by geologists are very expensive way; therefore, we used the Electro-Facies characterization which is a simple and cost-effective approach to classify one of Iraqi heterogeneous carbonate reservoirs using commonly available well logs.
The main goal of this work is to identify the optimum E-Facies units based on principal components analysis (PCA) and model based cluster analysis(MC
... Show More