Preferred Language
Articles
/
joe-1672
Modeling and Simulating NOMA Performance for Next Generations
...Show More Authors

Non-orthogonal Multiple Access (NOMA) is a multiple-access technique allowing multiusers to share the same communication resources, increasing spectral efficiency and throughput. NOMA has been shown to provide significant performance gains over orthogonal multiple access (OMA) regarding spectral efficiency and throughput. In this paper, two scenarios of NOMA are analyzed and simulated, involving two users and multiple users (four users) to evaluate NOMA's performance. The simulated results indicate that the achievable sum rate for the two users’ scenarios is 16.7 (bps/Hz), while for the multi-users scenario is 20.69 (bps/Hz) at transmitted power of 25 dBm. The BER for two users’ scenarios is 0.004202 and 0.001564 for user 1 and user 2, respectively, while the BER for multi-users scenario are 0.001738, 0.000706, 0.000286, and 0.000028 for user 1, user 2, user 3, and user 4 respectively. In addition, this paper has compared NOMA with OMA in terms of achievable sum rate. The obtained results indicate that an improvement is achieved for two users NOMA (16.7 (bps/Hz)) compared with OMA (15.53(bps/Hz)), while for multi-users NOMA (20.69 (bps/Hz)) compared with OMA (15.79 (bps/Hz)) at transmitted power of 25 dBm.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 01 2024
Journal Name
Russian Journal Of Bioorganic Chemistry
Synthesis, Identification, Antioxidant, Molecular Docking, and In Silico ADME Study for Some New Derivatives Containing Thiourea Moiety
...Show More Authors

Objective: Synthesized a series of new thiourea (TU) derivatives, tested their antioxidant activity, and investigated their expected biological activity by theoretical study (computational methods). Methods: The derivatives were made using a one-pot reaction with two steps. Initially, succinyl chloride was mixed with KSCN to make succinyl isothiocyanate. Then, primary and secondary amines were used to make TU derivatives. The theoretical studies were done by Swiss ADME and molecular docking via Genetic Optimization of Linkage Docking (GOLD). Then evaluate antioxidant activity using the DPPH scavenging method. Results: FT-IR, 1H NMR, and 13C NMR spectroscopy show the verification of all the prepared derivatives. Compounds (II), (VIII),

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Composition operator induced by ?(z) = sz + t for which |s|?1, |t|<1 and |s|+|t|?1
...Show More Authors

We study in this paper the composition operator that is induced by ?(z) = sz + t. We give a characterization of the adjoint of composiotion operators generated by self-maps of the unit ball of form ?(z) = sz + t for which |s|?1, |t|<1 and |s|+|t|?1. In fact we prove that the adjoint is a product of toeplitz operators and composition operator. Also, we have studied the compactness of C? and give some other partial results.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
Relationship between very low birth weight neonates and increased neonatal mortality for age 0 to 7 days
...Show More Authors

Background: Very low birth weight (VLBW) neonates constitute approximately 4–7 percent of all live births and their mortality is very high.
Objective: to find out if there is a relationship between Very Low Birth Weight Neonates and increased neonatal mortality for age 0 to 7 days.
Methods: A retrospective study of VLBW neonates admitted to NICU at Ibn Al- Baladi Pediatrics and Maternity hospital over one year (2012)were studied, The study period was from April till August 2013. Exclusion criteria were: (1) neonates weighing less than 700 g and with gestational age less than 24 weeks (abortion) (2) death in the delivery room (3) neonates weighing more than 1500 g. (4) Postnatal age more than 7 days. The outcome measure was in-hos

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 24 2025
Journal Name
Karbala International Journal Of Modern Science
Chemistry of Metalloguanines: An Overview of Their Synthesis Routes and Their Implementations for the Period 2000-2024
...Show More Authors

Guanine has a variety of roles in chemistry, from its basic function in the storing and transferring genetic information to its usages in synthetic chemistry and other fields. Because of its distinct structure and biological importance, it is a fundamental component of contemporary study in organic chemistry and molecular biology. In this review, we focused on covering the synthetic pathways of various derivatives of guanine from the year 2000 until the present. As a result of the guanine molecule containing multiple functional groups, this gives us the ability to prepare several guanines such as O6-alkylating guanines, O6-benzylguanines, 8-aza-O6-benzylguanines, 9-substituted guanines, guanine-azo derivatives, guanine Schiff bases, guanin

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Wed Nov 01 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Formulation and in vitro /in vivo Evaluation of Silymarin Solid Dispersion- Based Topical Gel for Wound Healing
...Show More Authors

Silybum marianum, from which silymarin (SM) is extracted, is a medicinal herb. In the Biopharmaceutics Classification System, it is of the class II type, meaning it is almost completely insoluble in water. It has a number of therapeutic properties, including anti-inflammatory as well as properties that promote wound healing.

This research target is to promote the dissolution and solubility of SM by employing a technique called solid dispersion and then incorporating the formula of solid dispersion into a topical gel that can be used for wound healing.

 

Solid dispersion is a technique used to enhance solubility and dissolve pharmaceuticals that are not water-soluble. This method is widely used because of its low cos

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (14)
Crossref (5)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Desalination And Water Treatment
Preparation and application of polyethersulfone ultrafiltration membrane incorporating NaX zeolite for lead ions removal from aqueous solutions
...Show More Authors

View Publication
Scopus (32)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Sat Jun 02 2018
Journal Name
Agroforestry Systems
Biomass and buffer management practice effects on soil hydraulic properties compared to grain crops for claypan landscapes
...Show More Authors

View Publication
Scopus (18)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Sep 20 2023
Journal Name
Environmental Progress &amp; Sustainable Energy
Production and characterization of composite activated carbon from potato peel waste for cyanide removal from aqueous solution
...Show More Authors
Abstract<p>This research presents a response surface methodology (RSM) with I‐optimal method of DESIGN EXPERT (version 13 Stat‐Ease) for optimization and analysis of the adsorption process of the cyanide from aqueous solution by activated carbon (AC) and composite activated carbon (CuO/AC) produced by pyro carbonic acid microwave using potato peel waste as raw material. Pyrophosphate 60% (wt) was used for impregnation with an impregnation ratio 3:1, impregnation time of 4 h at 25°C, radiant power of 700 W, and activation time of 20 min. Batch experiments were conducted to determine the removal efficiency of cyanide from aqueous solution to evaluate the influences of various experimental parameters su</p> ... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref