Future wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date very challenging. Although advanced iterative algorithms have been developed to address this challenge, they exhibit slow convergence speed and thus deliver high latency and computational complexity. To overcome this challenge, we propose a computationally efficient conjugate gradient-descent (CGD) algorithm based on the Riemannian manifold in order to optimize the DL training sequence at base station (BS), while improving the convergence rate to provide a fast CSI estimation for an FDD m-MIMO system. To this end, the sum rate and the computational complexity performances of the proposed training solution are compared with the state-of-the-art iterative algorithms. The results show that the proposed training solution maximizes the achievable sum rate performance, while delivering a lower overall computational complexity owing to a faster convergence rate in comparison to the state-of-the-art iterative algorithms.
Objective: Preparing training in a diverse style for young basketball players, and identifying the effect of training in a diverse style on some physical abilities (for young basketball players).Research methodology: the researchers chose the experimental method to know the research problem and its objectives, as it is represented by designing two equal groups, the control and the experimental, with pre- and post-tests. The study community was determined by youth basketball players for the 2023-2024 season, as the research community is (104) players, and a sample of (20) players was drawn from the youth category from Al-A'dhamiyah Sports Club, and it was chosen intentionally because they are the clubs most committed to training, as
... Show MoreAbstract
It considers training programs is an important process contributing to provide employees with the skills required to do their jobs efficiently and effectively, so it should be concerned with and the focus of all government our organizations, and perhaps the most important reasons that I was invited to select the subject (evaluation of training programs directed toward the diagnosis of the phenomenon of financial and administrative corruption) It is the importance of those programs working in the regulatory institutions General and the Office of Inspector General of Finance and the Ministry particularly for employees because of their role in the development of their skills and their experience and their beha
... Show MoreTaguchi experimental design (TED) is applied to find the optimum effectiveness of aqueous Red Pomegranate Peel (RPP) extract as a green inhibitor for the corrosion of mild steel in 2M H3PO4 solution. The Taguchi methodology has been used to study the effects of changing, temperature, RPP concentration and contact period, at three levels. Weight-loss measurements were designed by construction a L9 orthogonal arrangement of experiments. Results of the efficiencies of inhibition were embraced for the signal to noise proportion & investigation of variance (ANOVA). The results were further processed with a MINITAB-17 software package to find the optimal condition
... Show MoreThe main role of infill drilling is either adding incremental reserves to the already existing one by intersecting newly undrained (virgin) regions or accelerating the production from currently depleted areas. Accelerating reserves from increasing drainage in tight formations can be beneficial considering the time value of money and the cost of additional wells. However, the maximum benefit can be realized when infill wells produce mostly incremental recoveries (recoveries from virgin formations). Therefore, the prediction of incremental and accelerated recovery is crucial in field development planning as it helps in the optimization of infill wells with the assurance of long-term economic sustainabi
Background: The purpose of this study was to evaluate and compare centering ability and canal transportation of simulated S-shaped canals instrumented with four different types of rotary nickel-titanium systems. Materials and Methods: Forty simulated S-shaped canals in resin blocks were divided into four groups of ten each and were instrumented to an apical size 25 by different instrumentation technique using ProTaper Universal files (group A), ProTaperNext (group B), Reciproc (group C) and WaveOne (group D).Centering ability and canal transportation was measured at (11) measuring points from D0 to D10 bysuperimposion of the pre- and post-operative images obtained by using digital camera in standardized manner. An assessment of the canals
... Show MoreRoot-finding is an oldest classical problem, which is still an important research topic, due to its impact on computational algebra and geometry. In communications systems, when the impulse response of the channel is minimum phase the state of equalization algorithm is reduced and the spectral efficiency will improved. To make the channel impulse response minimum phase the prefilter which is called minimum phase filter is used, the adaptation of the minimum phase filter need root finding algorithm. In this paper, the VHDL implementation of the root finding algorithm introduced by Clark and Hau is introduced.
VHDL program is used in the work, to find the roots of two channels and make them minimum phase, the obtained output results are
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreSoftware testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli
... Show More