Preferred Language
Articles
/
joe-585
Performance enhancement of Echo Cancellation Using a Combination of Partial Update ( PU) Methods and New Variable Length LMS (NVLLMS) Algorithm
...Show More Authors

In this paper, several combination algorithms between Partial Update LMS (PU LMS) methods and previously proposed algorithm (New Variable Length LMS (NVLLMS)) have been developed. Then, the new sets of proposed algorithms were applied to an Acoustic Echo Cancellation system (AEC) in order to decrease the filter coefficients, decrease the convergence time, and enhance its performance in terms of Mean Square Error (MSE) and Echo Return Loss Enhancement (ERLE). These proposed algorithms will use the Echo Return Loss Enhancement (ERLE) to control the operation of filter's coefficient length variation. In addition, the time-varying step size is used.The total number of coefficients required was reduced by about 18% , 10% , 6%, and 16% using Periodic, Sequential, Stochastic, and M-max PU NVLLMS algorithms respectively, compared to that used by a full update method which  is very important, especially in the application of mobile communication since the power consumption must be considered. In addition, the average ERLE and average Mean Square Error (MSE) for M-max PU NVLLMS are better than other proposed algorithms.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
The Communicative Integration in New Media: Building a Communicative Model
...Show More Authors

The internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Constructing a new mixed probability distribution with fuzzy reliability estimation
...Show More Authors

This paper deals with constructing mixed probability distribution from mixing exponential

Scopus (6)
Scopus
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
A new vision for the classic in contemporary fashion designResearch
...Show More Authors

        fashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages      The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees19gr
The influence of partial substation of antimony & lanthanum oxides on electrical and structural properties for the superconductor compound Bi2-xSbxBa2Ca2-yLayCu3O10+δ
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Engineering
Numerical investigation on heat transfer enhancement and turbulent flow characteristics in a high aspect ratio rectangular duct roughened by intersecting ribs with inclined ribs
...Show More Authors

In this study, the effect of intersecting ribs with inclined ribs on the heat transfer and flow characteristics of a high aspect ratio duct has been numerically investigated. The Relative roughness pitch (P/e) is 10 and the Reynolds number range from 35,700 to 72,800. ANSYS (Fluent-Workbench 18.0) software has been utilized to solve the Reynolds averaged Navier-Stokes (RANS) equations with the Standard k-ε turbulence model. Three ribbed models have been used in this study. Model 1 which is a just inclined ribs, Model 2 which has a single longitudinal rib at the center with inclined ribs and Model 3 which has two longitudinal ribs at the sides. The results showed that the heat transfer rate has been enhanced when the int

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jun 12 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Effect of food an appearance of ovaries cysts its relation with some variable factors in women at age 15-54 years in Baghdad – city: Effect of food an appearance of ovaries cysts its relation with some variable factors in women at age 15-54 years in Baghdad – city
...Show More Authors

Abstract
This study aimed to kmow the effect of food on appearance of ovaries cyst in women aged 15-54 year in Baghdad. City and its relation ship with reproductive health Woman samples was divided to four aged groups;15-24 , 25-34 , 35-44 and 45-54 years.
Results demonstrate that all samples of women has varied level of obesity.
Also we are noticed that all samples of women has varied level of obesity.
Also we are noticed tgat is a relation ship between obesity and marriagestatas with the highest proportion of ovarian cystsin obese marriage woman reached to37.90% The percent of un married women which have obesity class // with ovarian cysts reached50% Results refer to found that %19-24 of married women had obortians and

... Show More
View Publication Preview PDF
Publication Date
Sun May 07 2017
Journal Name
Al. Qadisiya Journal For The Sciences Of Physical Education
Effect of stretching exercises on the muscles of the body in the development of the length and frequency of the strike of the arms free swimming for students of faculties of physical education and sports sciences
...Show More Authors

م. د. ولاء طارق حميد, Al. Qadisiya journal for the Sciences of Physical Education, 2017

View Publication
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Fri Jan 29 2021
Journal Name
Research Journal Of Pharmacy And Technologythis Link Is Disabled.
Exploration of a new fluoride resistance gene (Fram gene) in oral streptococcus mutans maw
...Show More Authors