Preferred Language
Articles
/
joe-1231
Simulation and Analysis of the OFDM Transceiver Based Commutation System
...Show More Authors

As a result of the increase in wireless applications, this led to a spectrum problem, which was often a significant restriction. However, a wide bandwidth (more than two-thirds of the available) remains wasted due to inappropriate usage. As a consequence, the quality of the service of the system was impacted. This problem was resolved by using cognitive radio that provides opportunistic sharing or utilization of the spectrum. This paper analyzes the performance of the cognitive radio spectrum sensing algorithm for the energy detector, which implemented by using a MATLAB Mfile version (2018b). The signal to noise ratio SNR vs. Pd probability of detection for OFDM and SNR vs. BER with CP cyclic prefix with energy detector is calculated and analyzed. In this paper, the proposed work produces more accurate results compared to the existing techniques at low SNR values.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of The College Of Languages (jcl)
A Critical Discourse Analysis of Hate Speech
...Show More Authors

Online communication on social networks has become a never-given-up way of expressing and sharing views and opinions within the realm of all topics on earth, and that is that! A basis essential in this is the limits at which "freedom of expression" should not be trespassed so as not to fall into the expression of "hate speech". These two ends make a base in the UN regulations pertaining to human rights: One is free to express, but not to hate by expression. Hereunder, a Critical Discourse Analysis in terms of Fairclough's dialectical-relational approach (2001) is made of Facebook posts (being made by common people, and not of official nature)  targeting Islam and Muslims. This is made so as to recognize these instances of "speech" a

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Wed May 31 2017
Journal Name
Journal Of Engineering
Stress Analysis of Spiral Bevel Gear Drives
...Show More Authors

This paper presents numerical and experimental stress analyses to evaluate the contact and bending stresses on the teeth of spiral bevel gear drive. Finite Element Method has been adopted as a numerical technique which accomplished basically by using ANSYS software package. The experimental stress analysis has been achieved by using a gear tooth model made of Castolite material which has photoelastic properties. The main goal of this research is detecting the maximum tooth stresses to avoid the severe areas that caused tooth failure and to increase the working life for this type of gear drives.

 

 

View Publication Preview PDF
Publication Date
Thu Sep 01 2022
Journal Name
Engineering Structures
Mesoscale analysis of Fiber-Reinforced concrete beams
...Show More Authors

Crossref (19)
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Employ Frameworks and Modern Standards in Evaluating Internal Control System: Applied Research in the General Company for Vegetable Oil Industry
...Show More Authors

In light of today's business world, who faces challenges and intense competition as a result of the rapid evolution of technical and informational, organizations had to respond to variables through the adoption of modern management techniques that reduce the effects of risks and activating the role of the internal control system in order to contribute to the early detection of risks and reduce the negative results expected .The research is to address the problem faced by organizations which still follow the traditional methods in the control activities, and the lack of knowledge of the management and their staff of the importance of the existence of risk management and internal control system takes into account these risks, and the limit

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Journal Of Engineering
Numerical Study for the Tube Rotation Effect on Melting Process in Shell and Tube Latent Heat Energy Storage LHES System
...Show More Authors

Although renewable energy systems have become an interesting global issue, it is not continuous either daily or seasonally. Latent heat energy storage (LHES) is one of the suitable solutions for this problem. LHES becomes a basic element in renewable energy systems. LHES compensate for the energy lack when these systems are at low production conditions. The present work considered a shell and tube LHES for numerical investigation of the tube rotation influence on the melting process. The simulation and calculations were carried out using ANSYS Fluent software. Paraffin wax represents the phase change material (PCM) in this work, while water was selected to be the heat transfer fluid (HTF). The calculations were carried o

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees21gr
The possibility of implementing smart mobility in the traditional city: Studying the possibility of establishing an intelligent transportation system in the city center of Kadhimiya
...Show More Authors

The possibility of implementing smart mobility in the traditional city: Studying the possibility of establishing an intelligent transportation system in the city center of Kadhimiya

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Mefenamic Acid Selective Membranes Sensor and Its Application to pharmaceutical Analysis
...Show More Authors

PVC membrane sensor for the selective determination of Mefenamic acid (MFA) was constructed. The sensor is based on ion association of MFA with Dodecaphospho molybdic acid (PMA) and Dodeca–Tungstophosphoric acid(PTA) as ion pairs. Nitro benzene (NB) and di-butyl phthalate (DBPH) were used as plasticizing agents in PVC matrix membranes. The specification of sensor based on PMA showed a linear response of a concentration range 1.0 × 10–2 –1.0 × 10–5 M, Nernstian slopes of 17.1-18.86 mV/ decade, detection limit of 7 × 10-5 -9.5 × 10 -7M, pH range 3 – 8 , with correlation coefficients lying between 0.9992 and 0.9976, respectively. By using the ionphore based on PTA gives a concentration range of 1.0 × 10–4 –1.0 × 10–5 M,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 03 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence
...Show More Authors

With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev

... Show More
View Publication
Scopus (21)
Crossref (11)
Scopus Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Mon Mar 27 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Lipid Profile and Fasting Blood Sugar Analysis in Patients with Cholelithiasis
...Show More Authors

Cholelithiasis is one of the commonest surgical problems and one of the most common gastrointestinal diseases throughout the world but its pathogenesis remains unclear. Many theories have been proposed forward to explain the mechanism of stone formation. It is not fully clear if symptomatic gallstone disease is associated with a specific pattern of some biochemical abnormalities, as lipid profile and fasting blood sugar in serum of patients.

This study was designed to estimate lipid profile and fasting blood sugar in the sera of patients with cholelithiasis in comparison with normal individuals (control).

In this study, 104(male=16, female=88) were symptomatic gallstone patients (aged 42.79± 12.18 years), and 38(male=6

... Show More
View Publication Preview PDF
Crossref