Preferred Language
Articles
/
joe-575
Estimating Angle of Arrival (AOA) for Wideband Signal by Sensor Delay Line (SDL) and Tapped Delay Line (TDL) Processors
...Show More Authors

Angle of arrival (AOA) estimation for wideband signal becomes more necessary for modern communication systems like Global System for Mobile (GSM), satellite, military applications and spread spectrum (frequency hopping and direct sequence). Most of the researchers are focusing on how to cancel the effects of signal bandwidth on AOA estimation performance by using a transversal filter (tap delay line) (TDL). Most of the researchers were using two elements array antenna to study these effects. In this research, a general case of proposed (M) array elements is used. A transversal filter (TDL) in phase adaptive array antenna system is used to calculate the optimum number of taps required to compensate these effect. The proposed system uses a phase adaptive array antenna in conjunction with LMS algorithm to work an angle of arrival (AOA) estimator for wideband signals rather than interference canceller. An alternative solution to compensate for the effect of signal bandwidth is proposed by using sensor delay line (SDL) instead of fixed delay unit since it has variable time sampling in the time domain and not fixed time delay, depending on the angle of arrival of received signals. The proposed system has the ability to estimate two parameters for received signals simultaneously (the output Signal to Noise Ratio (SNR) and AOA), unlike others systems which estimate AOA only. The comparison of the simulation results with Multiple Signal Classification (MUSIC) technique showed that the proposed system gives good results for estimating AOA and the output SNR for wideband signals. (SDL) processor shows better performance result than (TDL) processor. MUSIC technique with both (SDL) and (TDL) processors shows unacceptable results for estimating (AOA) for the wideband signal.  

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2025
Journal Name
Journal Of The College Of Languages (jcl)
Rebellious Self - A Reading in Madame Bovary's Character of Flubert and Hanna Konin by Amos Oz - Comparative study: האני המורדת - קריאה בדמותה של מאדאם בובארי של פלובר וחנה גונן של עמוס עוז – מחקר השוואתי
...Show More Authors

The problem of rebellion is considered one of the features of rapid changes that a society undergoes in all spheres and directions of life, especially in the realm of social relations, customs, traditions, values, and principles. Rebellion may manifest itself in rebellion against oneself, against values or traditions, or against social or governmental authority. One may find that submission plays a vital role in all of these interactions. This study deals with the problem of rebellion in the works of two renowned authors: The French Gustave Flaubert and the Israeli Amos Oz, through two main characters who share similar qualities and traits. Emma Bovary and Henna Konin demonstrate this through their rebellion against themselves, their relati

... Show More
View Publication
Publication Date
Sun Jan 01 2017
Journal Name
Indian Journal Of Pathology And Microbiology
Assessment of topoisomerase II-alpha gene status by dual color chromogenic in situ hybridization in a set of Iraqi patients with invasive breast carcinoma
...Show More Authors

Abstract Background: The human epidermal growth factor receptor 2(HER2) proto-oncogene is overexpressed or amplified in approximately 15%-25% of invasive breast cancers. Approximately 35% of HER2-amplified breast cancers have coamplification of the topoisomerase II-alpha (TOP2A) gene encoding an enzyme that is a major target of anthracyclines. Hence, the determination of genetic alteration (amplification or deletion) of both genes is considered as an important predictive factor that determines the response of breast cancer patients to treatment. The aims of this study are to determinate TOP2A status gene amplification in a set of Iraqi patients with breast cancer that have had an equivocal (2+) and positive HER2/neu by immunohistochemistry

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Alexandria Engineering Journal
Comparison of some Bayesian estimation methods for type-I generalized extreme value distribution with simulation
...Show More Authors

The Weibull distribution is considered one of the Type-I Generalized Extreme Value (GEV) distribution, and it plays a crucial role in modeling extreme events in various fields, such as hydrology, finance, and environmental sciences. Bayesian methods play a strong, decisive role in estimating the parameters of the GEV distribution due to their ability to incorporate prior knowledge and handle small sample sizes effectively. In this research, we compare several shrinkage Bayesian estimation methods based on the squared error and the linear exponential loss functions. They were adopted and compared by the Monte Carlo simulation method. The performance of these methods is assessed based on their accuracy and computational efficiency in estimati

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Aug 05 2019
Journal Name
Gen. Lett. Math
Building a three-dimensional maritime transport model to find the best solution by using the heuristic algorithm
...Show More Authors

The aim of this research is to construct a three-dimensional maritime transport model to transport nonhomogeneous goods (k) and different transport modes (v) from their sources (i) to their destinations (j), while limiting the optimum quantities v ijk x to be transported at the lowest possible cost v ijk c and time v ijk t using the heuristic algorithm, Transport problems have been widely studied in computer science and process research and are one of the main problems of transport problems that are usually used to reduce the cost or times of transport of goods with a number of sources and a number of destinations and by means of transport to meet the conditions of supply and demand. Transport models are a key tool in logistics an

... Show More
Publication Date
Thu Mar 30 2023
Journal Name
Optics Continuum
Ultrafast lithium disilicate veneer debonding time assisted by a CO<sub>2</sub> laser with temperature control
...Show More Authors

We report on using a CO2 (10.6 µm) laser to debond the lithium disilicate veneers. Sixty-four sound human premolar teeth and 64 veneer specimens were used in the study. The zigzag movement via CO2 laser handpiece along with an air-cooled jet to prevent temperature elevation above the necrosis temperature limit (5.5 C°) was applied. The optimal deboning irradiation time was super-fast, at about 5 seconds at 3 Watt CO2 laser power. It is 20 times less than any previously published work for veneers debonding. The enamel beneath the debonded veneers has been assessed by atomic force microscopy (AFM) and shear stress technique as criteria for the easiness of debonding. The

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon May 01 2017
Journal Name
Desalination And Water Treatment
Cadmium removal from simulated chloride wastewater using a novel flow-by fixed bed electrochemical reactor: Taguchi approach
...Show More Authors

View Publication
Scopus (10)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
A Modified Approach by Using Prediction to Build a Best Threshold in ARX Model with Practical Application
...Show More Authors

The proposal of nonlinear models is one of the most important methods in time series analysis, which has a wide potential for predicting various phenomena, including physical, engineering and economic, by studying the characteristics of random disturbances in order to arrive at accurate predictions.

In this, the autoregressive model with exogenous variable was built using a threshold as the first method, using two proposed approaches that were used to determine the best cutting point of [the predictability forward (forecasting) and the predictability in the time series (prediction), through the threshold point indicator]. B-J seasonal models are used as a second method based on the principle of the two proposed approaches in dete

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Sep 28 2017
Journal Name
Medycyna Pracy
MTS-6 detectors calibration by using &lt;sup&gt;239&lt;/sup&gt;Pu-Be neutron source
...Show More Authors

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref