This paper studies the adaptive coded modulation for coded OFDM system using punctured convolutional code, channel estimation, equalization and SNR estimation. The channel estimation based on block type pilot arrangement is performed by sending pilots at every sub carrier and using this estimation for a specific number of following symbols. Signal to noise ratio is estimated at receiver and then transmitted to the transmitter through feedback channel ,the transmitter according to the estimated SNR select appropriate modulation scheme and coding rate which maintain constant bit error rate
lower than the requested BER. Simulation results show that better performance is confirmed for target bit error rate (BER) of (10-3) as compared to conventional modulation schemes, the convolutional coded modulation offers a SNR gains of 5 dB compared to uncoded state at BER of 10-3. The proposed adaptive OFDM scheme maintains fixed BER under changing channel conditions.
In this paper, the impact of magnetic force, rotation, and nonlinear heat radiation on the peristaltic flow of a hybrid bio -nanofluids through a symmetric channel are investigated. Under the assumption of a low Reynolds number and a long wavelength, the exact solution of the expression for stream function, velocity, heat transfer coefficient, induced magnetic field, magnetic force, and temperature are obtained by using the Adomian decomposition method. The findings show that the magnetic force contours improve when the magnitude of the Hartmann number M is high and decreases when rotation increases. Lastly, the effects of essential parameters that appear in the problem are analyzed through a graph. Plotting all figures is done using the
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreCurrent numerical research was devoted to investigating the effect of castellated steel beams without and with strengthening. The composite concrete asymmetrical double hot rolled steel channels bolted back to back to obtain a built-up I-shape form are used in this study. The top half part of the steel is smaller than the bottom half part, and the two parts were connected by bolting and welding. The ABAQUS/2019 program employed the same length and conditions of loading for four models: The first model is the reference without castellated and strengthening; the second model was castellated without strengthened; the third model was castellated and strengthened with reactive powder concrete encased in the
... Show MoreFlat-plate collector considers most common types of collectors, for ease of manufacturing and low price compared with other collectors. The main aim of the present work is to increase the efficiency of the collector, which can be achieved by improving the heat transfer and minimize heat loss experimentally. Five types of solar air collectors have been tested, which conventional channel with a smooth absorber plate (model I), dual channel with a smooth absorber plate (model II), dual channel with perforating “V” corrugated absorber plate (model III), dual channel with internal attached wire mesh (model Ⅳ), and dual channel with absorber sheet of transparent honeycomb, (model Ⅴ). The dual channel collector used for
... Show MoreThe deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv
... Show MoreThe challenge in studying fusion reaction when the projectile is neutron or proton rich halo nuclei is the coupling mechanism between the elastic and the breakup channel, therefore the motivation from the present calculations is to estimate the best coupling parameter to introduce the effect of coupled-channels for the calculations of the total cross section of the fusion , the barrier distribution of the fusion and the average angular momentum 〈L〉 for the systems 6He+206Pb, 8B+28Si, 11Be+209Bi, 17F+208Pb, 6He+238U, 8He+197Au and 15C+232Th using quantum mechanical approach. A
... Show MoreTheoretical and experimental investigations of the transient heat transfer parameters of constant heat flux source subjected to water flowing in the downward direction in closed channel are conducted. The power increase transient is ensured by step change increase in the heat source power. The theoretical investigation involved a mathematical modeling for axially symmetric, simultaneously developing laminar water flow in a vertical annulus. The mathematical model is based on one dimensional downward flow. The boundary conditions of the studied case are based on adiabatic outer wall, while the inner wall is subjected to a constant heat flux. The heat & mass balance equation derived for specified element of bulk water within the annulu
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreAcute myeloid leukemia (AML) is heterogeneous disorders originated from the abnormalities in the proliferation and maturation of myeloid progenitors in bone morrow. There is a clinical correlation between immunity engines and disease progression, but this relationship is not completely clear yet. This study was designed to assess the full immune response in Iraqi patients diagnosed with AML. Patients and healthy volunteers were divided into three groups: newly diagnosed untreated, under chemotherapy treatment patients and control group. A significant reduction were seen in C4 and IFN-γ levels in both untreated and treated groups with no significant difference between untreated and treated groups. On the other hand, IL-2 and IL-8 levels inc
... Show More