Preferred Language
Articles
/
joe-1672
Modeling and Simulating NOMA Performance for Next Generations
...Show More Authors

Non-orthogonal Multiple Access (NOMA) is a multiple-access technique allowing multiusers to share the same communication resources, increasing spectral efficiency and throughput. NOMA has been shown to provide significant performance gains over orthogonal multiple access (OMA) regarding spectral efficiency and throughput. In this paper, two scenarios of NOMA are analyzed and simulated, involving two users and multiple users (four users) to evaluate NOMA's performance. The simulated results indicate that the achievable sum rate for the two users’ scenarios is 16.7 (bps/Hz), while for the multi-users scenario is 20.69 (bps/Hz) at transmitted power of 25 dBm. The BER for two users’ scenarios is 0.004202 and 0.001564 for user 1 and user 2, respectively, while the BER for multi-users scenario are 0.001738, 0.000706, 0.000286, and 0.000028 for user 1, user 2, user 3, and user 4 respectively. In addition, this paper has compared NOMA with OMA in terms of achievable sum rate. The obtained results indicate that an improvement is achieved for two users NOMA (16.7 (bps/Hz)) compared with OMA (15.53(bps/Hz)), while for multi-users NOMA (20.69 (bps/Hz)) compared with OMA (15.79 (bps/Hz)) at transmitted power of 25 dBm.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 28 2019
Journal Name
Iraqi Journal Of Science
Exploration of A Cemetery Using Ground Penetration Radar
...Show More Authors

     Ground penetrating radar (GPR) technology is used to determine the extent to which this technique can detect with a high-frequency range from 10 MHz to 1000 MHz into the ground by a transmitting antenna and A graveyard was found beneath the depth of the three meters under Surface of the earth in the shrine of the Prophet Houd and Saleh in Al-Najaf Governorate surveyed by through 4 tracks. Ground Penetrating Radar (GPR) is a device that transmits short pulses of electromagnetic energy with pulse duration about 1 ns to 20 ns. applying the filter Time- Zero to the same profile at a depth (3m) , Two types of antennas were used in this study, with two different frequencies antennas (250, 500 )MHz Three tracks (23,25,2

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jan 31 2017
Journal Name
Journal Of Engineering
Static Analysis of Laminated Composite Plate using New Higher Order Shear Deformation Plate Theory
...Show More Authors

 In the present work a theoretical analysis depending on the new higher order . element in shear deformation theory for simply supported cross-ply laminated plate is developed. The new displacement field of the middle surface expanded as a combination of exponential and trigonometric function of thickness coordinate with the transverse displacement taken to be constant through the thickness. The governing equations are derived using Hamilton’s principle and solved using Navier solution method to obtain the deflection and stresses under uniform sinusoidal load. The effect of many design parameters such as number of laminates, aspect ratio and thickness ratio on static behavior of the laminated composite plate has been studied. The

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
S-Coprime Submodules
...Show More Authors

  In this paper, we introduce and study the concept of S-coprime submodules, where a proper submodule N of an R-module M is called S-coprime submodule if M N is S-coprime Rmodule. Many properties about this concept are investigated.

View Publication Preview PDF
Publication Date
Thu Dec 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modules with Chain Conditions on S-Closed Submodules
...Show More Authors

  Let L be a commutative ring with identity and let W be a unitary left L- module. A submodule D of an L- module W is called  s- closed submodule denoted by  D ≤sc W, if D has   no  proper s- essential extension in W, that is , whenever D ≤ W such that D ≤se H≤ W, then D = H. In  this  paper,  we study  modules which satisfies  the ascending chain  conditions (ACC) and descending chain conditions (DCC) on this kind of submodules.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Notes on Approximately Pure Submodules
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.

View Publication Preview PDF
Crossref
Publication Date
Sun Apr 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Study the Contrast of Thermal Expansion Behavior of the Unsaturated Polyester resin (UP) containing Phenolic Bakelite(PF) By Using The Thermomechanical Analysis Technique(TMA)
...Show More Authors

TMA Technique was used to study the behavior of the thermal expansion (α) of the unsaturated polyester resin(UP) containing ratios wt % of different phenolic Bakelite. We can through this technique evaluate the coefficient of linear thermal expansion (α) on the one hand and the glass transition temperature(Tg)  of his other hand of polymer composite prepared .Evidenced from this study that extravagant increases the ratio of phenolic Bakelite in polyester prepared led to a decrease in the Tg and it was observed that there is increase in the values of (α) in low temperture and decrease in high temperture due to transformation of polymeric material from elastic to plastic , and therefore, increase the ratio to 15% phenoli

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Structures
The effect of ground motion characteristics on the fragility analysis of reinforced concrete frame buildings in Australia
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fuzzy Semimaximal Submodules
...Show More Authors

     Let R be a commutative ring with unity and an R-submodule N is called semimaximal if and only if

 the sufficient conditions of F-submodules to be semimaximal .Also the concepts of (simple , semisimple) F- submodules and quotient F- modules are  introduced and given some  properties .

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Engineering
Prediction of Monthly Fluoride Content in Tigris River using SARIMA Model in R Software
...Show More Authors

The need to create the optimal water quality management process has motivated researchers to pursue prediction modeling development. One of the widely important forecasting models is the sessional autoregressive integrated moving average (SARIMA) model. In the present study, a SARIMA model was developed in R software to fit a time series data of monthly fluoride content collected from six stations on Tigris River for the period from 2004 to 2014. The adequate SARIMA model that has the least Akaike's information criterion (AIC) and mean squared error (MSE) was found to be SARIMA (2,0,0) (0,1,1). The model parameters were identified and diagnosed to derive the forecasting equations at each selected location. The correlation coefficien

... Show More
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More