The basic concept of diversity; where two or more inputs at the receiver are used to get uncorrelated signals. The aim of this paper is an attempt to compare some possible combinations of diversity reception and MLSE detection techniques. Various diversity combining techniques can be distinguished: Equal Gain Combining (EGC), Maximal Ratio Combining (MRC), Selection Combining and Selection Switching Combining (SS).The simulation results shows that the MRC give better performance than the other types of combining (about 1 dB compare with EGC and 2.5~3 dB compare with selection and selection switching combining).
This study is considered to be the first on this sector of Tigris River after 2003, to evaluate the effect of Tharthar Arm on the composition and diversity of Copepoda in Tigris River. Six sampling sites were selected; two on the Tharthar Arm and four sites along the Tigris River, one before the confluence as a control site and the others downstream the confluence; thirty-five copepod taxa were recorded, 34 taxa in the Tigris River and 25 taxa in the Tharthar Arm.
The highest density of Copepoda was in site 2 at Tharthar Arm was 265584.2 Ind./m3 lead to an increasing in Copepoda density in Tigris River from 63878.2 Ind./m3 in site 1 before the confluence to 127198.3 Ind./m3 in site 4 immediately downstream the confluence. Also, the me
The researcher has studied in his research (International Public Relations methods in building the state's image through Cyberspace)
, analytical study of the Facebook and twitter pages for British foreign office , the role was played by the International Public Relations in building the mental image of British , especially after the new media and internet have became influential role in political life . and became an important tools used by political institutions as ministries of foreign affairs in the twenty: one century .
The researcher identified the problem of this study with the following question:
(what is the role of the International Public Relations in building the mental image of state through Cyberspace)
To answer
This research deals with the use of a number of statistical methods, such as the kernel method, watershed, histogram, and cubic spline, to improve the contrast of digital images. The results obtained according to the RSME and NCC standards have proven that the spline method is the most accurate in the results compared to other statistical methods.
This research deals with the use of a number of statistical methods, such as the kernel method, watershed, histogram and cubic spline, to improve the contrast of digital images. The results obtained according to the RSME and NCC standards have proven that the spline method is the most accurate in the results compared to other statistical methods
In this work, two different structures are proposed which is fuzzy real normed space (FRNS) and fuzzy real Pre-Hilbert space (FRPHS). The basic concept of fuzzy norm on a real linear space is first presented to construct space, which is a FRNS with some modification of the definition introduced by G. Rano and T. Bag. The structure of fuzzy real Pre-Hilbert space (FRPHS) is then presented which is based on the structure of FRNS. Then, some of the properties and related concepts for the suggested space FRN such as -neighborhood, closure of the set named , the necessary condition for separable, fuzzy linear manifold (FLM) are discussed. The definition for a fuzzy seminorm on is also introduced with the prove that a fuzzy seminorm on
... Show MoreIn this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution
In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution.
In this work, we introduced and studied a new kind of soft mapping on soft topological spaces with an ideal, which we called soft strongly generalized mapping with respect an ideal I, we studied the concepts like SSIg-continuous, Contra-SSIg-continuous, SSIg-open, SSIg-closed and SSIg-irresolute mapping and the relations between these kinds of mappings and the composition of two mappings of the same type of two different types, with proofs or counter examples
Strong and ∆-convergence for a two-step iteration process utilizing asymptotically nonexpansive and total asymptotically nonexpansive noneslf mappings in the CAT(0) spaces have been studied. As well, several strong convergence theorems under semi-compact and condition (M) have been proved. Our results improve and extend numerous familiar results from the existing literature.