Preferred Language
Articles
/
joe-1208
Ergodic Capacity for Evaluation of Mobile System Performance
...Show More Authors

In this research the performance of 5G mobile system is evaluated through the Ergodic capacity metric. Today, in an­­y wireless communication system, many parameters have a significant role on system performance. Three main parameters are of concern here; the source power, number of antennas, and transmitter-receiver distance. User equipment’s (UEs) with equal and non-equal powers are used to evaluate the system performance in addition to using different antenna techniques to demonstrate the differences between SISO, MIMO, and massive MIMO. Using two mobile stations (MS) with different distances from the base station (BS), resulted in showing how using massive MIMO system will improve the performance than the standard SISO and MIMO techniques, under Rayleigh fading channel. Using MATLAB as a simulation tool it was found that the ergodic channel capacity enhance by increasing the power of the source and the base station antenna and it behaves in an opposite way with distance.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Global NAVIGATION Satellite System Contribution for Observing the Tectonic Plate Movements: Status and Perspectives
...Show More Authors

The long-term monitoring of land movements represents the most successful application of the Global Navigation Satellite System (GNSS), particularly the Global Positioning System. However, the application of long term monitoring of land movements depends on the availability of homogenous and consistent daily position time series of stations over a period of time. Such time series can be produced very efficiently by using Precise Point Positioning and Double Difference techniques based on particular sophisticated GNSS processing softwares. Nonetheless, these rely on the availability of GNSS products which are precise satellite orbit and clock, and Earth orientation parameters. Unfortunately, several changes and modifications have been mad

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 31 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Airborne Computer System Based Collision-Free Flight Path Finding Strategy Design for Drone Model
...Show More Authors

View Publication
Scopus (10)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 15 2019
Journal Name
Al-khwarizmi Engineering Journal
Mesoporous Silica MCM-41 as a Carriers Material for Nystatine Drug in Delivery System
...Show More Authors

In the present study, MCM-41 was synthesis as a carrier for poorly drugs soluble in water, by the sol-gel technique. Textural and chemical characterizations of MCM-41 were carried out by X-ray diffraction (XRD), Fourier transform infrared (FTIR), scanning electron microscope (SEM), and thermal gravimetric analysis (TGA). The experimental results were analyzed mesoporous carriers MCM-41. With maximum drug loading efficiency in MCM-41 determined to be 90.74%. The NYS released was prudently studied in simulated body fluid (SBF) pH 7.4 and the results proved that the release of NYS from MCM-41 was (87.79%) after 18 hr. The data of NYS released was found to be submitted a Weibull model with a correlation coefficient of (0.995). The Historical

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
High Order Sliding Mode Observer-Based Output Feedback Controller Design For Electro-Hydraulic System
...Show More Authors

A perturbed linear system with property of strong observability ensures that there is a sliding mode observer to estimate the unknown form inputs together with states estimation. In the case of the electro-hydraulic system with piston position measured output, the above property is not met. In this paper, the output and its derivatives estimation were used to build a dynamic structure that satisfy the condition of strongly observable. A high order sliding mode observer (HOSMO) was used to estimate both the resulting unknown perturbation term and the output derivatives. Thereafter with one signal from the whole system (piton position), the piston position make tracking to desire one with a simple linear output feedback controller after ca

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Wed Sep 15 2021
Journal Name
Geomechanics And Geoengineering
Effect of Deep Remediation and Improvement on Bearing Capacity and Settlement of Piled Raft Foundation Subjected to Static and Cyclic Vertical Loading
...Show More Authors

View Publication Preview PDF
Scopus (8)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Thu Nov 08 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of National Standards for Exposure to Chemical Materials and Dusts in the State Company for Drugs Industry in Samarra
...Show More Authors

Objective: Evaluation the national standards for exposure to chemical materials and dusts in The State
Company for Drugs Industry in Samarra.
Methodology: A descriptive evaluation design is employed through the present study from 25th May 2011
to 30th November 2011 in order to evaluate the national standards for exposure chemical materials and dusts
in The State Company for Drugs Industry in Samarra. A purposive (non-probability) sample is selected for the
study which includes (110) workers from the State Company for Drugs Industry in Samarra. Data were
gathered through the workers` interviewed according to the nature of work that they perform. The evaluation
questionnaire comprised of three parts which include the w

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
2012 International Conference On Radar, Communication And Computing (icrcc)
BER performance improvement for secure wireless communication systems based on CSK- STBC techniques
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
BER performance enhancement for secure wireless communication systems based on chaotic-MIMO techniques
...Show More Authors

The growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref