The GPS navigation measurements become more widely used in many civilian and scientific application. All GPS navigation data holds many errors, the main error sources arise from the geodetic Datum variation when user apply the GPS measurements with the map. Geodetic datums define the size and shape of the earth and the origin and orientation of the coordinate systems used to map the earth surface. In this paper, the Datum transformation was evaluated in two mathematical methods to overcome the errors due to the difference between the WGS-84 and our country Datum Clarck-1880. The results was evaluated and investigated using Carmin GPS device for GCPs comparison, topographic map for Hilla city, mid Iraq 1:100000 scale, and two georefrencing ETM+ & TM satellite images. The spatial transformation error was less than 10 meter for UTM projection & less than 1 sec for (?, ?) projection, which can considered as suitable results in transformation calculation All results were overcome using two written program for each method with the help of Matlab facility. GPS: Global Positioning System, GCPs: Ground Control Points
In this paper, we present multiple bit error correction coding scheme based on extended Hamming product code combined with type II HARQ using shared resources for on chip interconnect. The shared resources reduce the hardware complexity of the encoder and decoder compared to the existing three stages iterative decoding method for on chip interconnects. The proposed method of decoding achieves 20% and 28% reduction in area and power consumption respectively, with only small increase in decoder delay compared to the existing three stage iterative decoding scheme for multiple bit error correction. The proposed code also achieves excellent improvement in residual flit error rate and up to 58% of total power consumption compared to the other err
... Show MoreDiscriminant analysis is a technique used to distinguish and classification an individual to a group among a number of groups based on a linear combination of a set of relevant variables know discriminant function. In this research discriminant analysis used to analysis data from repeated measurements design. We will deal with the problem of discrimination and classification in the case of two groups by assuming the Compound Symmetry covariance structure under the assumption of normality for univariate repeated measures data.
... Show More
This paper assesses the impact of changes and fluctuations in bank deposits on the money supply in Iraq. Employing the research constructs an Error Correction Model (ECM) using monthly time series data from 2010 to 2015. The analysis begins with the Phillips-Perron unit root test to ascertain the stationarity of the time series and the Engle and Granger cointegration test to examine the existence of a long-term relationship. Nonparametric regression functions are estimated using two methods: Smoothing Spline and M-smoothing. The results indicate that the M-smoothing approach is the most effective, achieving the shortest adjustment period and the highest adjustment ratio for short-term disturbances, thereby facilitating a return
... Show MoreThis paper presents a comparison between the electroencephalogram (EEG) channels during scoliosis correction surgeries. Surgeons use many hand tools and electronic devices that directly affect the EEG channels. These noises do not affect the EEG channels uniformly. This research provides a complete system to find the least affected channel by the noise. The presented system consists of five stages: filtering, wavelet decomposing (Level 4), processing the signal bands using four different criteria (mean, energy, entropy and standard deviation), finding the useful channel according to the criteria’s value and, finally, generating a combinational signal from Channels 1 and 2. Experimentally, two channels of EEG data were recorded fro
... Show MoreEnsuring reliable data transmission in Network on Chip (NoC) is one of the most challenging tasks, especially in noisy environments. As crosstalk, interference, and radiation were increased with manufacturers' increasing tendency to reduce the area, increase the frequencies, and reduce the voltages. So many Error Control Codes (ECC) were proposed with different error detection and correction capacities and various degrees of complexity. Code with Crosstalk Avoidance and Error Correction (CCAEC) for network-on-chip interconnects uses simple parity check bits as the main technique to get high error correction capacity. Per this work, this coding scheme corrects up to 12 random errors, representing a high correction capac
... Show MoreBlood samples were collected from (31) pregnant women infected with cytomegalovirus , also (15) blood samples were collected from congenitally infected infants, and (20),(15),(15) blood samples were collected from pregnant women ,non pregnant and infants, respectively, all of them were as control groups. CMV infection identified by using ELISA assay to detect specific CMV IgM & IgG in sera. The results of lymphocyte transformation showed a significant decrease when phytoheamagglutinin (PHA) used as stimulator, lymphocytes response in infected pregnant women was lower than that of non infected pregnant women as well as non pregnant women. Result also showed a significant decrease in the ability of lymphocyte division in healthy pregnant w
... Show MoreThe impact of digital transformation on the relationship between commercial bank customers’ empowerment and competitive advantage
The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use
... Show More