The problem of frequency estimation of a single sinusoid observed in colored noise is addressed. Our estimator is based on the operation of the sinusoidal digital phase-locked loop (SDPLL) which carries the frequency information in its phase error after the noisy sinusoid has been acquired by the SDPLL. We show by computer simulations that this frequency estimator beats the Cramer-Rao bound (CRB) on the frequency error variance for moderate and high SNRs when the colored noise has a general low-pass filtered (LPF) characteristic, thereby outperforming, in terms of frequency error variance, several existing techniques some of which are, in addition, computationally demanding. Moreover, the present approach generalizes on existing work that addresses different methods of sinusoid frequency estimation involving
specific colored noise models such as the moving average (MA) noise model. An insightful theoretical analysis is presented to support the practical findings.
The estimation of the amounts of Surface runoff resulting from rainfall in the water basins is of great importance in water resources management. The study area (Bahr Al-Najaf) is located on the western edge of the plateau and the southwestern part of the city center of Najaf, with an area of 2729.4 (km2). The soil and water assessment tool (SWAT) with ArcGIS software was used to simulate the runoff coming from the three main valleys (Kharr (A and B)), Shoaib Al-Rahimawi, and Maleh), that contribute the flow to the study area. The results of the model showed that the SWAT software was successfully simulating the flow conditions based on the coefficient of determination (R2), the Nash coefficient (NS
... Show MoreEquation Boizil used to Oatae approximate value of bladder pressure for 25 healthy people compared with Amqas the Alrotinahh ways used an indirect the catheter Bashaddam and found this method is cheap and harmless and easy
An investigation was conducted to suggest relations for estimating yield and properties of the improved light lubricating oil fraction produced from furfural extraction process by using specified regression.
Mass transfer in mixer-settler has been studied. Mass transfer coefficient of continuous phase, mass transfer coefficient of dispersed phase and the overall mass transfer coefficient extraction of light lubes oil distillate fraction by furfural are calculated in addition to all physical properties of individual components and the extraction mixtures.
The effect of extraction variables were studied such as extraction temperature which ranges from 70 to 110°C and solvent to oil ratio which ranges from 1:1 to 4:1 (wt/wt
... Show MoreFour genetic populations ( P1 , P2 , F1 , F2) were used in this study .
The parental cross in barley ( P1 barakq and P2 Pakistan ) was done . Many quantitative
pheno types were estimated such as plants length , tillers number , grains yield , capsules
number , the number of grains per capsule and the weight of 1000 grains . The results showed
significant differences in genetic variance values in the seconed filial generation ( F2) for all
the studied phenotypes : High values for the heritability were observed for all the studied
phenotypes .
These results indicated the effect of additive and non-additive genes on the quantitative
phenotypes . Finally , the selection of first generation can utilized for impro
This study included 46 patients with liver hydatid cyst diagnosed clinically and surgically, control group consist of 22 were naïve from infection had been confirmed by specialist. The patients were divided according to the size of the cysts into more and less than 5 cm diameter size, were 33 and 13 respectively. Also it divided into primary and secondary hydatid cyst infection which were 30 and 16 respectively. The role of immunological response against hydatid cyst parasite, showed a significant increased in humoral immunoglobulins (IgG, IgA, IgM and IgE) which were significantly higher in the hydatid cyst infection than control. Also significant increased in immunoglobulins in secondary infection than primary infection, beside significa
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreIn this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreRecently, wireless charging based RF harvesting has interfered our lives [1] significantly through the different applications including biomedical, military, IoT, RF energy harvesting, IT-care, and RFID technologies. Wirelessly powered low energy devices become significantly essential for a wide spectrum of sensing applications [1]. Such devices require for low energy resources from sunlight, mechanical vibration, thermal gradients, convection flows or other forms of harvestable energy [2]. One of the emerging power extraction resources based on passive devices is harvesting radio frequency (RF) signals powers [3]–[5]. Such applications need devices that can be organized in very large numbers, so, making separate node battery impractical.
... Show More