The presence of a single complex adaptive weight in each element channel of an adaptive array antenna is sufficient for processing of narrowband signals. The ability of an adaptive array antenna to null interference deteriorates rapidly as the interference bandwidth increases. The performance of narrowband adaptive array antenna with LMCV Beamforming algorithm is examined. The interaction effects between received signal angle of arrival and array parameters like the interelement spacing and the number of array element and the received signal bandwidth were studied. The output Signal to Interference plus Noise Ratio (SINR) and Interference to Noise Ratio (INR) are used as performance parameters for evaluation of these effects. It is found
... Show MoreResearch objective to identify the degree of environmental sustainability values of the student-teacher in the College of Education for Pure Sciences. In this research the methodology of relational descriptive research was adopted, and the research sample consisted of (116) students from the College of Education for Pure Sciences / Ibn Al-Haytham / University of Baghdad From the Department of Chemistry (fourth stage), that is, 54% of the research community were randomly selected. The research tool was prepared, represented by a measure of environmental sustainability values of (20) items, the results of the research showed: The poor degree of environmental sustainability values. The Statistical Portfolio of Social Sciences (SPSS) was adopte
... Show MoreObjectives: This study explored knowledge, attitude, and practice of infection control by dental students at College of Dentistry/ University of Baghdad, Iraq. Material and Methods: Three hundred dental students participated in this study. A self administrated questionnaire with 21 close ended questions related to use of personal protective equipments, infection control awareness, vaccination status, percutaneous exposures, and attitude towards treatment of patients with hepatitis B (HBV)/ or human immunodeficiency virus (HIV) was distributed to dental students. Data were analyzed using Statistical Package for Social Sciences (SPSS) version 21. Fisher exact and Chi-square test were used with significance level set to 0.05. Results: The
... Show MoreThe study aimed to prepare psychological measures of intellectual emptiness and mental distraction on university students. The two researchers used the descriptive approach in the two methods of surveying and correlational relations to suit the nature of the research, where the study sample consisted of (101) students of physical education and sports sciences. The phrase- Intellectual emptiness(35) and (34) is a phrase for mental distraction and presented it to experts in psychology, testing and measurement, and the statistical bag for social sciences (spss) was used, and the results of the research showed that intellectual emptiness has a moral relationship with straying among some students of the College of Physical Education
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreThe electrical performance of bottom-gate/top source-drain contact for p-channel organic field-effect transistors (OFETs) using poly(3-hexylthiophene) (P3HT) as an active semiconductor layer with two different gate dielectric materials, Polyvinylpyrrolidone (PVP) and Hafnium oxide (HfO2), is investigated in this work. The output and transfer characteristics were studied for HfO2, PVP and HfO2/PVP as organic gate insulator layer. Both characteristics show a high drain current at the gate dielectric HfO2/PVP equal to -0.0031A and -0.0015A for output and transfer characteristics respectively, this can be attributed to the increasing of the dielectric capacitance. Transcondactance characteristics also studied for the three organic mater
... Show MoreThe fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show MoreThe aim of the research is to identify the effectiveness of the educational pillars strategy based on Vygotsky's theory in mathematical achievement and information processing of first-grade intermediate students. In pursuit of the research objectives, the experimental method was used, and the quasi-experimental design was used for two equivalent groups, one control group taught traditionally and the other experi-mental taught according to the educational pillars strategy. The research sample consisted of (66) female students from the first intermediate grade, who were inten-tionally chosen after ensuring their equivalence, taking into account several factors, most notably chronological age and their level of mathematics, and they we
... Show More