In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation) structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of these procedures and compare them using generated data.
This study was conducted to describe a protocol for the callus establishing culture of Lavandula angustifolia plant and estimating their content of volatile oil. The quantity of volatile oil callus tissues was compared with that of leaves production. Callus was induced from leaf explants on Murashige and Skoog medium (MS) supplemented with Naphthalene acetic acid (NAA) and Benzyl adenine (BA) in different concentrations. Maximum callus fresh weight was obtained in the combination of 10 mg/L BA and 3 mg/L NAA which reached 18 g after four weeks. The results of this work showed that the quantity of volatile oil from the highest fresh weight callus was 6 ml compared with quantity of 18g of leaves which gave 0.5 ml. Volatile o
... Show MoreThis study was aimed to develop an optimized Dy determination method using differential pulse voltammetry (DPV). The Plackett-Burman (PB) experimental design was used to select significant factors that affect the electrical current response, which were further optimized using the response surface method-central composite design (RSM-CCD). The type of electrolyte solution and amplitude modulation were found as two most significant factors, among the nine factors tested, which enhance the current response based on PB design. Further optimization using RSM-CCD shows that the optimum values for the tw
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreThe aesthetic contents of data visualization is one of the contemporary areas through which data scientists and designers have been able to link data to humans, and even after reaching successful attempts to model data visualization, it wasn't clear how that reveals how it contributed to choosing the aesthetic content as an input to humanize these models, so the goal of the current research is to use The analytical descriptive approach aims to identify the aesthetic contents in data visualization, which the researchers interpreted through pragmatic philosophy and Kantian philosophy, and analyze a sample of data visualization models to reveal the aesthetic entrances in them to explain how to humanize them. The two researchers reached seve
... Show MoreChannel estimation and synchronization are considered the most challenging issues in Orthogonal Frequency Division Multiplexing (OFDM) system. OFDM is highly affected by synchronization errors that cause reduction in subcarriers orthogonality, leading to significant performance degradation. The synchronization errors cause two issues: Symbol Time Offset (STO), which produces inter symbol interference (ISI) and Carrier Frequency Offset (CFO), which results in inter carrier interference (ICI). The aim of the research is to simulate Comb type pilot based channel estimation for OFDM system showing the effect of pilot numbers on the channel estimation performance and propose a modified estimation method for STO with less numb
... Show MoreWireless channels are typically much more noisy than wired links and subjected to fading due to multipath propagation which result in ISI and hence high error rate. Adaptive modulation is a powerful technique to improve the tradeoff between spectral efficiency and Bit Error Rate (BER). In order to adjust the transmission rate, channel state information (CSI) is required at the transmitter side.
In this paper the performance enhancement of using linear prediction along with channel estimation to track the channel variations and adaptive modulation were examined. The simulation results shows that the channel estimation is sufficient for low Doppler frequency shifts (<30 Hz), while channel prediction is much more suited at
... Show MoreA simple, rapid spectrophotometric method has been established for the determination of chlorpromazine hydrochloride (CPZ) in its pure form and in a tablet formulations. The suggested method is based on the oxidative coupling reaction with4-nitroainlline using KIO3 in acidic solution to produce a violet colored product with maximum absorption at λ=526 nm.The analytical data obtained throughout this study could be summarid as follows: 1ml of 1M HCl (pH=2.2), 1 ml of 4-nitroanilline (1x10-2M), and 1.5ml of (1x10-2)KIO3 per 25 ml reaction medium. The order of a
... Show MoreTransport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.