Preferred Language
Articles
/
joe-600
Compensation of the Nonlinear Power Amplifier by Using SCPWL Predistorter with Genetic Algorithm in OFDM technique
...Show More Authors

The High Power Amplifiers (HPAs), which are used in wireless communication, are distinctly characterized by nonlinear properties. The linearity of the HPA can be accomplished by retreating an HPA to put it in a linear region on account of power performance loss. Meanwhile the Orthogonal Frequency Division Multiplex signal is very rough. Therefore, it will be required a large undo to the linear action area that leads to a vital loss in power efficiency. Thereby, back-off is not a positive solution. A Simplicial Canonical Piecewise-Linear (SCPWL) model based digital predistorters are widely employed to compensating the nonlinear distortion that introduced by a HPA component in OFDM technology. In this paper, the genetic algorithm has been used to optimized the SCPWL coefficients by using Matlab 2015b, and then the Bit Error Rate (BER) performance has been evaluated for OFDM signal with 16-QAM and 64-QAM modulations in three cases, with nonlinear effects, without nonlinear effects (ideal case), with SCPWL and with nonlinear effects (compensated case)). The simulation results showed that the predistorter that adjusted by the genetic algorithm accomplishes huge execution change by successfully compensating the nonlinearity and reducing the input and output back-off (IBO, OBO) of the HPA.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
The Impact of Applying Mind Mapping Technique as a Pre- Writing Tool on EFL College Students in Essay Writing
...Show More Authors

Based on the assumption that the more teachers know about brain science, the better
prepared they will be to make instructional decisions.
Mind Mapping is a powerful tool for assisting any form of writing. Language is an
important device and a very beneficial means for human being to communicate with other
people .Writing is one of the language skills that will never be left in education.
The study aims at investigating the Impact of applying mind mapping technique as a prewriting
tool on Iraqi EFL college students in essay writing. To do so, 60 EFL college students
were divided randomly selected and divided into two groups experimental and control. Prior
to treatment, participants of the both groups were given a

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 03 2021
Journal Name
Journal Of Optoelectronic And Biomedical Materials
Antibacterial activity with eggshell nanoparticles activated by microwave plasma.
...Show More Authors

The eggshell cuticle is the proteinaceous outermost layer of the eggshell which regulates water exchange and protects against entry of micro-organisms. Outer eggshell and cuticle protein was extracted from domestic chicken. The aim of the research is to find out the effect of the treated and untreated nano particles of egg shells with micro wave cold plasma on the effectiveness of E. coli (negative bacteria) that infect the skin and measure the diameter of bacterial inhibition zone, the eggshell has been prepared by a chemical method (sol gel) and measure the level of acidity and the PH is neutral. The result of Atomic Force Microscope (AFM) shows that the particles diameters become smaller with nano-particles solution than for egg

... Show More
Preview PDF
Publication Date
Thu Aug 31 2017
Journal Name
Journal Of Engineering
Enhanced Performance of Consensus Wireless Sensor Controlled System via Particle Swarm Optimization Algorithm
...Show More Authors

     This paper describes the application of consensus optimization for Wireless Sensor Network (WSN) system. Consensus algorithm is usually conducted within a certain number of iterations for a given graph topology. Nevertheless, the best Number of Iterations (NOI) to reach consensus is varied in accordance with any change in number of nodes or other parameters of . graph topology. As a result, a time consuming trial and error procedure will necessary be applied
to obtain best NOI. The implementation of an intellig ent optimization can effectively help to get the optimal NOI. The performance of the consensus algorithm has considerably been improved by the inclusion of Particle Swarm Optimization (PSO). As a case s

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 02 2023
Journal Name
Journal Of Pakistan Association Of Dermatologists
The frequency of acute radiodermatitis and associated risk factors among patients with breast cancer treated by radiotherapy
...Show More Authors

Background: Acute radiodermatitis is a common side effect during and after radiotherapy course in breast cancer patients treated by radiotherapy. This study assess the frequency of acute radiodermatitis and record the predictive factors for acute radiodermatitis. Patients and Methods: A descriptive case series study conducted at Baghdad, Iraq from August 2020 to September 2021. 70 female scheduled for radiotherapy sessions enrolled in this study. sociodemographic data were recorded and Skin examination before radiotherapy and weekly till the end of the radiotherapy sessions was done to report the frequency, risk factors, clinical picture and grades of acute radiodermatitis based on The National Cancer Institute’s Common Terminology Crite

... Show More
View Publication Preview PDF
Scopus
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Ridge regression method with some classical methods to estimate the parameters of Lomax distribution by simulation
...Show More Authors

Abstract

In this research provide theoretical aspects of one of the most important statistical distributions which it is Lomax, which has many applications in several areas, set of estimation methods was used(MLE,LSE,GWPM) and compare with (RRE) estimation method ,in order to find out best estimation method set of simulation experiment (36) with many replications  in order  to get mean square error and used it to make compare , simulation experiment  contrast with (estimation method, sample size ,value of location and shape parameter) results show that estimation method effected by simulation experiment factors and ability of using other estimation methods such as(Shrinkage, jackknif

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 03 2021
Journal Name
Key Engineering Materials
Study the Behavior of Castellated Steel Column Encasing by Different Reactive Powder Concrete Thickness with Laced Reinforcement
...Show More Authors

Castellated columns are structural members that are created by breaking a rolled column along the center-line by flame after that rejoining the equivalent halves by welding such that for better structural strength against axial loading, the total column depth is increased by around 50 percent. The implementation of these institutional members will also contribute to significant economies of material value. The main objectives of this study are to study the enhancement of the load-carrying capacity of castellated columns with encasement of the columns by Reactive Powder Concrete (RPC) and lacing reinforcement, and serviceability of the confined castellated columns. The Castellated columns with RPC and Lacing Reinforcement improve com

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
Numerical Analysis of Fluid Flow and Heat Transfer by Forced Convection in Channel with one-sided Semicircular Sections and Filled with Porous Media
...Show More Authors

This research presents a numerical study to simulate the heat transfer by forced convection as a result of fluid flow inside channel’s with one-sided semicircular sections and fully filled with porous media. The study assumes that the fluid were Laminar , Steady , Incompressible and inlet Temperature was less than Isotherm temperature of a Semicircular sections .Finite difference techniques were used to present the governing equations (Momentum, Energy and Continuity). Elliptical Grid is Generated using Poisson’s equations . The Algebraic equations were solved numerically by using (LSOR (.This research studied the effect of changing the channel shapes on fluid flow and heat transfer  in two cases ,the first: cha

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 01 2021
Journal Name
Clinics And Research In Hepatology And Gastroenterology
Genetic polymorphism of fibroblast growth factor receptor 2 and trinucleotide repeat-containing 9 influence the susceptibility to HCV-induced hepatocellular carcinoma
...Show More Authors

Background Fibroblast growth factor receptor 2 (FGFR2) and trinucleotide repeat-containing 9 (TNRC9) gene polymorphisms have been associated with some cancers. We aimed to assess the association of FGFR2 rs2981582 and TNRC9 rs12443621 polymorphisms with hepatocellular cancer risk. Methods One hundred patients with HCV-induced HCC, 100 patients with chronic HCV infection, and 100 controls were genotyped for FGFR2 rs2981582 and TNRC9 rs12443621 using allele-specific Real-Time PCR analysis. Results FGFR2 rs2981582 genotype TT was associated with increased risk of HCC when compared to controls (OR = 3.09, 95% CI = 1.24–7.68). However, it was significantly associated with a lower risk of HCC when using HCV patients as controls (OR =

... Show More
Scopus (5)
Scopus