Preferred Language
Articles
/
joe-2124
Improving the Direction of Arrival Estimation Using the Parasitic Subspace Generated by Active-Parasitic Antenna (APA) Arrays
...Show More Authors

The improvement in Direction of Arrival (DOA) estimation when the received signals impinge on Active-Parasitic Antenna (APA) arrays will be studied in this work. An APA array consists of several active antennas; others are parasitic antennas. The responses to the received signals are measured at the loaded terminals of the active element. The terminals of the parasitic element are shorted. The effect of the received signals on the parasites, i.e., the induced short-circuit current, is mutually coupled to the active elements. Eigen decomposition of the covariance matrix of the measurements of the APA array generates a third subspace in addition to the traditional signal and noise subspaces generated by the all-active antenna receiving array. This additional subspace, the parasitic subspace, is accompanied by very small eigenvalues (approaching zero). Hence, a complete orthogonality between this subspace and the column space of the steering matrix of the array can be obtained. As a result, better resolution in estimating the DOA can be achieved. Several simulations in conjunction with the MUSIC algorithm, which have been conducted in this work, depict that the APA array outperforms the all-active antenna array as a direction finder, regardless of the size of the array, the number of active elements, or the number of measurement snapshots. Furthermore, super-resolution DOA estimation can be achieved when a subset of the parasitic subspace is used as if the measurement were noiseless. Also, the APA array contributes to very small RMSE values over a wide range of S/N of the received signals.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Improving the Performance of Constructed Wetland Microbial Fuel Cell (CW- MFC) for Wastewater Treatment and Electricity Generation
...Show More Authors

The current study deals with the performance of constructed wetland (CW) incorporating a microbial fuel cell (MFC) for wastewater treatment and electricity generation. The whole unit is referred to as CW-MFC. This technique involves two treatments; the first is an aerobic treatment which occurs in the upper layer of the system (cathode section) and the second is anaerobic biological treatment in the lower layer of the system (anode section). Two types of electrode material were tested; stainless steel and graphite. Three configurations for electrodes arrangement CW-MFC were used. In the first unit of CW-MFC, the anode was graphite plate (GPa) and cathode was also graphite plate (GPc), in the second CW-MFC unit, the anode was stainless st

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of the method of partial least squares and the algorithm of singular values decomposion to estimate the parameters of the logistic regression model in the case of the problem of linear multiplicity by using the simulation
...Show More Authors

The logistic regression model is an important statistical model showing the relationship between the binary variable and the explanatory variables.                                                        The large number of explanations that are usually used to illustrate the response led to the emergence of the problem of linear multiplicity between the explanatory variables that make estimating the parameters of the model not accurate.    

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Gravimetric Estimation of Caffeine in Different Commercial Kinds of Tea Found in the Iraqi Market
...Show More Authors

          Caffeine (1,3,7-trimethylxanthine), which is the most widely consumed stimulant in the world, had been isolated and estimated gravimetrically in fifteen  different commercial kinds of tea found in the Iraqi market.The kinds of tea were chosen according to their differences in the degree of fermentation and the method of processing i.e. black , gray and  green . The isolated caffeine was identified by melting point, sublimation, TLC, chemical tests, UV , IR , HPLC and CHNO analysis.                                 &nb

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
This study sought to determine the impact of spreading the culture of quality in improving the quality of tourism service in some hotels in Erbil governorate
...Show More Authors

This study sought to determine the impact of spreading the culture of quality in improving the quality of tourism service in some hotels in Erbil governorate. The theme of excellence in providing service and attention to it has become the concern of most organizations in general and tourism service organizations in particular. Tourists try to establish the mental status of customers about their tourism organizations had to pay attention to the quality of service provided to the customer and work to develop them to the advanced stages of satisfaction and happiness of customers and this will certainly positively affect the improvement of service in the tourism sector, Of the research variables were examined statistically by distrib

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Analysis of the requirements of electronic management and its role improving The performance of human resources: Applied research at Iraqi general insurance company
...Show More Authors

The study seeks to identify e-governance requirements in human resources management, which are (administrative requirements, technical, human, financial, and security) which is a new style differs from the traditional management pattern, where work depends on multiple forms and methods of Tools, (e. g. computers and various electronic software), by relying on powerful information systems that help to make management decisions as quickly and less effortless and less expensive to keep up with the tremendous technological advancements in the field of information and communication technology revolution.

 The sample included 132 Person who constitute a position (Director General, assistant Director General, section managers and d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Review Of International Geographical Education
Investing Organizational Identity in Improving Work Teams: An Exploratory Study of a Sample of The Capital's Traffic Directorates
...Show More Authors

The research aims to identify the role of organizational identity in improving work teams, and to suggest ways to deal with the outputs of work teams in a way that achieves the goals of the Baghdad Traffic Directorate as it is the subject of the application of the research, while the research community was represented by its officers, while the research sample was embodied in (General Director, Associate The Director General, the directors of Rusafa and Karkh traffic and their assistants, as well as the heads of the divisions and the officials of the departments) in it. The sample was (200) observations. The descriptive exploratory approach was devoted to conducting the research, relying on the questionnaire in data collection, as well as e

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Training Program to Improve some Aspects of Sensory Integration Disorder and Its Effect on Self-Direction Among a Sample of Children with Intellectual Disabilities
...Show More Authors

The present research was conducted to investigate the effectiveness of a training program to improve some aspects of sensory integration disorder and its effect on self-direction among a sample of children with intellectual disabilities. The study sample consists of (10 subjects as an experimental group) were exposed to the training program، and the control group consists of (10 subjects as a control group) were not exposed to the training program. The study included the following tools: A scale of self-direction for intellectual disability (prepared by the researcher). Training program (prepared by the researcher). The Results of the study showed the following: There are no statistically significant differences between the means ranks

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
The use of the methods of the lower squares and the smaller squares weighted in the estimation of the parameters and design of the sample acceptance schemesFor general exponential distribution
...Show More Authors

The acceptance sampling plans for generalized exponential distribution, when life time experiment is truncated at a pre-determined time are provided in this article. The two parameters (α, λ), (Scale parameters and Shape parameters) are estimated by LSE, WLSE and the Best Estimator’s for various samples sizes are used to find the ratio of true mean time to a pre-determined, and are used to find the smallest possible sample size required to ensure the producer’s risks, with a pre-fixed probability (1 - P*). The result of estimations and of sampling plans is provided in tables.

Key words: Generalized Exponential Distribution, Acceptance Sampling Plan, and Consumer’s and Producer Risks

... Show More
View Publication Preview PDF
Crossref