As a result of the increase in wireless applications, this led to a spectrum problem, which was often a significant restriction. However, a wide bandwidth (more than two-thirds of the available) remains wasted due to inappropriate usage. As a consequence, the quality of the service of the system was impacted. This problem was resolved by using cognitive radio that provides opportunistic sharing or utilization of the spectrum. This paper analyzes the performance of the cognitive radio spectrum sensing algorithm for the energy detector, which implemented by using a MATLAB Mfile version (2018b). The signal to noise ratio SNR vs. Pd probability of detection for OFDM and SNR vs. BER with CP cyclic prefix with energy detector is calculated and analyzed. In this paper, the proposed work produces more accurate results compared to the existing techniques at low SNR values.
Live the present companies in a competitive business environment going on and try to achieve excellence in their industry through the marketing of their products and achieve greater market share as possible to ensure its continued existence, and perhaps the concept of time production, which confirms, in essence, on the need to reduce inventory to a minimum in the production process as well as the concept of the marketing information system which asserts, in essence, to document all the events that are related to the marketing of the product provided by the production process, together constitute the subject deserves research and investigation as they have raised well-known in the fields of production management and marketing management.
... Show MoreThis article briefly analyzing contemporary works appeared in theater writer from Latin America, which comes within the theme of "power." Latin American Literature, such as two-way extremely clear: the vanguard of social and attention, have arrived at certain moments to some extent be regarded as a two-way rival. That desire to participate in the revolution of expression and artistic significance, has appeared evident in the literature of Latin America in the late nineteenth century and ended in the third decade of the twentieth century. The writers that stage would prefer not to serve the objectives of the revolution of Arts own but the objectives of social and political revolution that stimulate the world. These acts were issued
... Show MoreThe rotor dynamics generally deals with vibration of rotating structures. For designing rotors of a high speeds, basically its important to take into account the rotor dynamics characteristics. The modeling features for rotor and bearings support flexibility are described in this paper, by taking these characteristics of rotor dynamics features into standard Finite Element Approach (FEA) model. Transient and harmonic analysis procedures have been found by ANSYS, the idea has been presented to deal with critical speed calculation. This papers shows how elements BEAM188 and COMBI214 are used to represent the shaft and bearings, the dynamic stiffness and damping coefficients of journal bearings as a matrices have been found
... Show MoreSchiff bases are versatile compounds synthesized from the condensation of primary amino compounds with aldehydes or ketones. The high thermal of many Schiff base and their complexes were useful attributes for their application as catalysts in reactions involving at high temperatures. This thermal behavior of Schiff bases and their complexes was evaluated by TGA/DTG and DTA curves with 10 mass losses related to dehydration and decomposition. This review summarizes the developments in the last decade for thermal analysis of Schiff bases. Therefore, synthesis of Schiff bases and their complexes are reviewe
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreAbstract
The method binery logistic regression and linear discrimint function of the most important statistical methods used in the classification and prediction when the data of the kind of binery (0,1) you can not use the normal regression therefore resort to binary logistic regression and linear discriminant function in the case of two group in the case of a Multicollinearity problem between the data (the data containing high correlation) It became not possible to use binary logistic regression and linear discriminant function, to solve this problem, we resort to Partial least square regression.
In this, search th
... Show MoreMultiple drilling problems are being faced continuously while drilling wells in the southern Iraqi oil fields. Many of which are handled poorly and inefficiently which yields longer non-productive time due to the lack of knowledge about the source of these problems. This study aims to investigate the Basra oil fields formations from Faris to Mishrif, diagnose the potential problems, and present the optimum treatment for each problem.
Gathering of field data and previous studies on the subject, in addition to the field experience of drilling supervisors were all the information bases of this study. Southern Iraqi oil fields were studied and analyzed care
Explainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show MoreOn the basis of known coumarin-based prodrug system, a novel coumarin-based mutual prodrug of 5-fluorouracil and dichloroacetic acid was designed, synthesized and evaluated as a promising oral chemotherapeutic agent basing on in vitro stability study in HCl buffer (pH 1.2) and in phosphate buffer (pH 7.4), as well as in vitro release study in human serum. The chemical structure of prodrug was confirmed by analyzing its FTIR, 1H NMR, 13C NMR and MS-ESI spectra. The results of in vitro kinetic study indicated that the prodrug was significantly stable in HCl and in phosphate buffers, and was hydrolyzed in human serum followed pseudo first order kinetics.
Keywords: Coumarin-bas
... Show MoreCopper oxide nanoparticles (CuO NPs) were synthesized by two methods. The first was chemical method by using copper nitrate Cu (NO3)2 and NaOH, while the second was green method by using Eucalyptus camaldulensis leaves extract and Cu (NO3)2. These methods easily give a large scale production of CuO nanoparticles. X-ray diffraction pattern (XRD) reveals single phase monoclinic structure. The average crystalline size of CuO NPs was measured and used by Scherrer equation which found 44.06nm from chemical method, while the average crystalline size was found from green method was 27.2nm. The morphology analysis using atomic force microscopy showed that the grain size for CuO NPs was synthesized by chemical and green methods were 77.70 and 89.24
... Show More