This study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise Jaccard index of the membership of the multipaths to their clusters. The multipaths generated by C2CM were transformed using the directional cosine transform (DCT) and the whitening transform (WT). The transformed dataset was clustered using SC and 3CAM-SC. The clustering performance was validated using the Jaccard index by comparing the reference multipath dataset with the calculated multipath clusters. The results show that the effectiveness of SC is similar to the state-of-the-art clustering approaches. However, 3CAM-SC outperforms SC in all channel scenarios. SC can be used in indoor scenarios based on accuracy, while 3CAM-SC is applicable in indoor and semi-urban scenarios. Thus, the clustering approaches can be applied as alternative clustering techniques in the field of channel modeling.
Abstract:
Purpose\The researcher paper aims to determine the impact of information technology on the job performance, for Iraq private ban as through the use of technology dimensions of job performance.
The aim of this research: this study aims to discuss the importance of information technology and its role in achieving job performance and its impact on the Iraq banking sector design/ methodology/ approach used entrance design/methodology/approach- pilot, the questionnaire was used to collect data in order to develop a model to measure reliably and correctly to the variables of information technology and job performance, and hypotheses were tested through the use of some statisti
... Show MoreFour samples of the Se55S20Sb15Sn10 alloy were prepared using the melting point method. Samples B, C and D were irradiated with (6.04×1010, 12.08×1010 and 18.12×1010 (n.cm-2s -1 ) of thermal neutron beam from a neutron source (241Am-9Be) respectively, while sample A was left not irradiated. The electrical properties were assessed both before and after the radiation. All irradiated and non-irradiated samples show three conduction mechanisms, at low temperatures, electrical conductivity is achieved by electron hopping between local states near the Fermi level. At intermediate temperatures, conduction occurs by the jumping of electrons between local states at band tails. At high temperatures, electrons transfer between extended stat
... Show Morebackground: human epidermal growth factor receptor-2 (her2/neu) is related to growth factor receptors with alkaline kinase activity and it is regarded as important prognostic and therapeutic factor that can depended on in breast cancer therapy. HER2/neu expression by immunohistochemistry (IHC) is submitted to a great in terob server inconsistency. Subsequently additional confirmatory tests for assessment of gene alterations and amplification status are needed for patients with early or metastatic breast cancer. In situ hybridization techniques and specifically Chromogenic in situ hybridization (CISH) was arise as a practical, cost-effective, and alternative to fluorescent in situ hybridization in testing for gene alterationAims of the study
... Show MoreThis study has aimed to measure the relationship between the skills required for the labor market and the employment of graduates of community colleges at King Khalid University. For gathering the required data, a questionnaire has been designed and distributed to the faculty members of community colleges at King Khalid University in a random sample method. The chosen sample size has covered (123) individuals. Questionnaire forms have been distributed and retrieved from (117) participants. Therefore, the estimated response has reached 95 % of the total sample size. The results of the study have shown that there is not any significant relationship between the skills which the graduates acquire and the requirements of employmen
... Show MoreThis research aims to examine the effectiveness of a teaching strategy based on the cognitive model of Daniel in the development of achievement and the motivation of learning the school mathematics among the third intermediate grade students in the light of their study of "Systems of Linear Equations”. The research was conducted in the first semester (1439/1440AH), at Saeed Ibn Almosaieb Intermediate School, in Arar, Saudi Arabia. A quasi-experimental design has been used. In addition, a (pre & post) achievement test (20 Questions) and a (pre & post) scale of learning motivation to the school mathematics (25 Items) have been applied on two groups: a control group (31Students), and an experimental group (29 Students). The resear
... Show MoreThe study aimed at identifying the strategic gaps in the actual reality of the management of public organizations investigated to determine the strategy used based on the study model. The study relied on the variable of the general organization strategy in its dimensions (the general organization strategy, the organization's political strategy and the defense strategy of the organization) The sample of the study was (General Directorate of Traffic, Civil Status Directorate and Civil Defense Directorate), formations affiliated to the Ministry of the Interior, for the importance of the activity carried out by these public organizations by providing them In order to translate the answers into a quantitative expression in the analysi
... Show MoreThe research problem is that most of the construction projects exceed the planned value, due to the failure to implement the plans on time. The current study aims to monitor the implementation of the project and for each of the executed tasks of the table of quantities in order to detect deviations at the time they occur, evaluate the time and cost performance, and then identify the areas of waste and analyze the implementation of each task in order to diagnose the underlying problems and find possible and applicable solutions in the environment Iraqi. The research was applied in one of the companies specialized in the field of construction projects, and one of the most important conclusions reached is the possibility of applying
... Show MoreIn this research ,we will study the phenomenon of dust storms for all types
(Suspended dust , rising dust , dust storm) , and its relationship with some climate
variables (Temperature , rainfall ,wind speed , Relative humidity ) through
regression models to three different locations ( Kirkuk , Rutba , Diwaniya ) almost
covering Iraq area for the period (1981 – 2012) . Time series has been addressing the
phenomenon of storms and climate variables for the time period under study to
attain the best models for long range forcast to the dust storms.
Image classification can be defined as one of the most important tasks in the area of machine learning. Recently, deep neural networks, especially deep convolution networks, have participated greatly in end-to-end learning which reduce need for human designed features in the image recognition like Convolution Neural Network. It is offers the computation models which are made up of several processing layers for learning data representations with several abstraction levels. In this work, a pre-trained deep CNN is utilized according to some parameters like filter size, no of convolution, pooling, fully connected and type of activation function which includes 300 images for training and predict 100 image gender using probability measures. Re
... Show MoreWith the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show More