Preferred Language
Articles
/
bsj-6629
Performance Analysis of Propagation in VHF Military Tactical Communication System
...Show More Authors

The main challenge of military tactical communication systems is the accessibility of relevant information on the particular operating environment required for the determination of the waveform's ideal use. The existing propagation model focuses mainly on broadcasting and commercial wireless communication with a highs transceiver antenna that is not suitable for numerous military tactical communication systems. This paper presents a study of the path loss model related to radio propagation profile within the suburban in Kuala Lumpur. The experimental path loss modeling for VHF propagation was collected from various suburban settings for the 30-88 MHz frequency range. This experiment was highly affected by ecological factors and existing wave propagation effects such as reflection, diffraction, scattering, and Doppler effect. Radio propagation performance is evaluated by collecting received power at the allocated substation and comparing it against existing propagation models. The existing propagation model also will be tuned close to the measurement value by identifying the best path loss exponent to perform a suitable model for a suburban area. Theoretical assessments and analysis of the initial measurement stage for radio propagation show the extensive contribution of radio field from potential obstacles at lower VHF frequencies for both short and medium ranges around there. The explanation indicates the standard radio propagation prediction models that are generally reasonable for the suburban area. From the general error analysis, it is seen that, the performance of the LDPL with adjusting path loss exponent is the suitable model since it has least value of error metrics.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
Comparative Analysis of H2 and H∞ Robust Control Design Approaches for Dynamic Control Systems
...Show More Authors

This paper discusses using H2 and H∞ robust control approaches for designing control systems. These approaches are applied to elementary control system designs, and their respective implementation and pros and cons are introduced. The H∞ control synthesis mainly enforces closed-loop stability, covering some physical constraints and limitations. While noise rejection and disturbance attenuation are more naturally expressed in performance optimization, which can represent the H2 control synthesis problem. The paper also applies these two methodologies to multi-plant systems to study the stability and performance of the designed controllers. Simulation results show that the H2 controller tracks a desirable cl

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Engineering, Technology & Applied Science Research
Theoretical Analysis of Composite RC Beams with Pultruded GFRP Beams subjected to Impact Loading
...Show More Authors

Glass Fiber Reinforced Polymer (GFRP) beams have gained attention due to their promising mechanical properties and potential for structural applications. Combining GFRP core and encasing materials creates a composite beam with superior mechanical properties. This paper describes the testing encased GFRP beams as composite Reinforced Concrete (RC) beams under low-velocity impact load. Theoretical analysis was used with practical results to simulate the tested beams' behavior and predict the generated energies during the impact loading. The impact response was investigated using repeated drops of 42.5 kg falling mass from various heights. An analysis was performed using accelerometer readings to calculate the generalized inertial load

... Show More
View Publication
Scopus (23)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sun Feb 15 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of the stress concentration of different incisal ridge preparations of porcelain veneers (Finite element analysis)
...Show More Authors

Background: Porcelain veneers are under a great deal of stress which may lead to clinical failure as fracture or dettachment. This study examined whether different finishing lines and lingual shoulder preparations in the incisal area of the maxillary central incisor affect the bond of the porcelain veneers. Materials and methods: A two- dimensional finite element model was made. Location and magnitude of maximum Von Mises stresses were calculated in porcelain veneer. Six types of preparations were drawn as:incisal overlap of 0.5mm, 1mm and 1.5mm depth and lingual shoulder, and incisal overlap of 0.5mm, 1mm and 1.5mm depth without shoulder preparation. Results: Stress formation is maximum in the incisal edge region. All the lingual shoulder

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 09 2021
Journal Name
Turkish Journal Of Physiotherapy And Rehabilitation,
The Violation of Religious Human Rights: A sample Analysis of an Offensive Image of Islamic Concept
...Show More Authors

The purpose of this paper is to investigate Religious Human Rights Violations. Religious liberty is essential for everyone, everywhere. Because religion is significant to everyone, everywhere. Humans are religious by nature. Our nature drives us to seek answers to deep questions about ultimate things. We cannot live a fully human life unless we are free to seek those answers and live according to the truths we discover. In this study, the researcher used Marsh and White model for analysis A sample of an offensive image of an Islamic concept from the book "Mohammad believes it or else." this book is a comic book written by pseudonym Abdullah Aziz and published by Crescent Moon Publishing company. The book is marked with anti- Mohammad, preju

... Show More
Preview PDF
Publication Date
Mon Oct 03 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A New Feature-Based Method for Similarity Measurement under the Linux Operating System
...Show More Authors

This paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,

... Show More
View Publication
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Engineering
Power System Stabilizer PSS4B Model for Iraqi National Grid using PSS/E Software
...Show More Authors

To damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. Double input multiband Power system stabilizers (PSSs) were used to damp out low-frequency oscillations in power system. Among dual-input PSSs, PSS4B offers superior transient performance. Power system simulator for engineering (PSS/E) software was adopted to test and evaluate the dynamic performance of PSS4B model on Iraqi national grid. The results showed

... Show More
Crossref (7)
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Personal tax exemptions "a comparative study with some Arab and European system legislations
...Show More Authors

This research aims primarily to highlight personal tax exemptions A comparative study with some Arab and European regulations. And by conducting both theoretical comparative analyses. Most important findings of the study is the need to grant personal and family exemptions that differ according to the civil status of the taxpayer (single or married). In other words, the exemption increases as the number of family members depend on its social sense. Also taking into account some incomes that require a certain effort and looking at the tax rates, it is unreasonable for wages to be subject to the same rates applied to commercial profits.      

View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Auditing the comprehensive electronic banking system to detect operational business risks (applied research)
...Show More Authors

Abstract:

                In light of the development in the banking environment and the increasing reliance on electronic systems in providing banking services and due to the intense competition witnessed by the banking sector, the need has emerged to apply the comprehensive electronic banking system, which works on the Internet in providing new and diverse banking services regardless of time and place by linking all branches to one central database, and despite the advantages achieved from the application of the comprehensive system, there is a set of risks that accompany the use of that system, What requires the auditors to develop the audit method in line with the size of the development in the

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 02 2022
Journal Name
Turkish Journal Of Computer And Mathematics Education (turcomat)
Mpeg-Dash System via HTTP2 Protocol with HEVC Encoder for Video Streaming Services
...Show More Authors

MPEG-DASH is an adaptive bitrate streaming technology that divides video content into small HTTP-objects file segments with different bitrates. With live UHD video streaming latency is the most important problem. In this paper, creating a low-delay streaming system using HTTP 2.0. Based on the network condition the proposed system adaptively determine the bitrate of segments. The video is coded using a layered H.265/HEVC compression standard, then is tested to investigate the relationship between video quality and bitrate for various HEVC parameters and video motion at each layer/resolution. The system architecture includes encoder/decoder configurations and how to embedded the adaptive video streaming. The encoder includes compression besi

... Show More
View Publication Preview PDF