In this research the performance of 5G mobile system is evaluated through the Ergodic capacity metric. Today, in any wireless communication system, many parameters have a significant role on system performance. Three main parameters are of concern here; the source power, number of antennas, and transmitter-receiver distance. User equipment’s (UEs) with equal and non-equal powers are used to evaluate the system performance in addition to using different antenna techniques to demonstrate the differences between SISO, MIMO, and massive MIMO. Using two mobile stations (MS) with different distances from the base station (BS), resulted in showing how using massive MIMO system will improve the performance than the standard SISO and MIMO techniques, under Rayleigh fading channel. Using MATLAB as a simulation tool it was found that the ergodic channel capacity enhance by increasing the power of the source and the base station antenna and it behaves in an opposite way with distance.
Abstract
To evaluate the effectiveness of Phenolic Compound of Salvia Frigida on induced atopic dermatitis (AD) of mice. Forty mice were included in the study, divided in to four groups (10 mice/group): apparently healthy, induced AD without treatment, induced AD treated with tacrolimus 0.1% ointment, and induced AD treated with Phenolic Compound of Salvia Frigida cream 5%. Examination of histopathology was done and skin homogenates levels also measured. Levels of WBC, Eosinophil, skin tissue homogenate of IL-13 and IL-4, serum IgE, and histopathological scores were significantly increased among induced non treated AD group in comparison with control group. Comparisons of non-treated induced AD
... Show MoreABSTRACT Background: Tuberculosis is a worldwide infectious disease in spite of advancement in health care system. Tuberculous lymphadenitis is the most prevalent form of extra pulmonary tuberculosis with predilection of cervical lymph nodes. Objectives: To evaluate the reliability of grey scale ultrasonography together with color Doppler in the diagnosis of cervical tuberculous lymph adenitis and evaluation of early therapeutic response. Subjects and methods:From July 2015 to May 2016 in Al-Karama teaching hospital /Kut city- Wasit-Iraq, 25 patients (14 males and 11 females) with ages range from (6-50) years. Ultrasonography examination was done for all patients and grey scale criteria (distribution, size, shape, echogenicity, echogenic hi
... Show MoreBackground: The Andrews’ six keys of normal occlusion contribute individually and collectively to the total scheme of occlusion and, therefore, are viewed as essential to successful orthodontic treatment. The present research aims to evaluate the presence of the parameters of the Andrews’ Six Keys of normal occlusion in a sample of 100 Iraqi adults with complete permanent dentition and clinically acceptable normal occlusion (Angle’s Class I) in Baghdad city. Their age range 18-25 years (60 males and 40 females). Materials and methods: Each patient was subjected to clinical examination and then study cast models were made, with their occlusal records. The measuring tools that have been used involved: Three-dimensional goniometer to me
... Show MoreBackground: Acute myocardial infarction (AMI) is one of the most common diagnoses in hospitalized patients. Increased plasma hemostatic markers were noted in acute myocardial infarction, indicating that the blood coagulation system is highly activated in those patients. Aims of the study: To study the level of intrinsic coagulation factors including (FVIII:C, FIX:C ,FXI:C ,FXII:C ) in patients with acute myocardial infarction. Type of the study: Cross –sectional study. Methods: Thirty patients (their age range is 48-68 years) were included in this study (9 female, 21 male) who were just admitted to the coronary care unit in AL-Yarmouk Teaching Hospital and diagnosed as having acute myocardial infarction patients, blood samples were tak
... Show MoreNitrogen (N) is a key growth and yield-limiting factor in cultivated rice areas. This study has been conducted to evaluate the effects of different conditions of N application on rice yield and yield components (Shiroudi cultivar) in Babol (Mazandaran, Iran) during the 2015- 2016 season. A factorial experiment executed of a Randomized Complete Block Design (RCBD) used in three iterations. In the first factor, treatments were four N amounts (including 50, 90, 130, and 170 kg N ha-1), while in the second factor, the treatments consisted of four different fertilizer splitting methods, including T1:70 % at the basal stage + 30 % at the maximum tillering stage, T2:1/3 at the basal stage + 1/3 at the maximum ti
... Show Moreتعد الموازنة الأداة الأساسية لتنفيذ أولويات أية دولة، ويتوجب النظر إليها في ضوء المناخ الاجتماعي والسياسي والاقتصادي، لأنها تساعد في توجيه الاقتصاد لتحقيق النمو ورفع مستوى الرفاهية. اعتمدت وزارة المالية في أعداد الموازنة السنوية بعد 9/4/ 2003 أسلوباً مغايراً لما كان معتمداً في العقود الماضية، إذ كانت هناك موازنتين الأولى الموازنة الجارية، والثانية الموازنة الاستثمارية رغم وجود قانون يحتم إصدار موازنة
... Show MoreCorruption has become the subject of great interest, and the subject of research and scrutiny in recent years, because of its penetration in all fields of life, whether these fields are political, economic, social, and administrative. It is one of the biggest challenges and problems that are facing communities. Therefore, this study is focused on the evaluation of measures implementing the national strategy to combat corruption in Iraq.
This study was launched, first because of its intellectual dimensions to ensure a conceptual presentation of the strategy and operational management in general with a special focus on the processes of implementation and control str
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show More