Preferred Language
Articles
/
joe-600
Compensation of the Nonlinear Power Amplifier by Using SCPWL Predistorter with Genetic Algorithm in OFDM technique
...Show More Authors

The High Power Amplifiers (HPAs), which are used in wireless communication, are distinctly characterized by nonlinear properties. The linearity of the HPA can be accomplished by retreating an HPA to put it in a linear region on account of power performance loss. Meanwhile the Orthogonal Frequency Division Multiplex signal is very rough. Therefore, it will be required a large undo to the linear action area that leads to a vital loss in power efficiency. Thereby, back-off is not a positive solution. A Simplicial Canonical Piecewise-Linear (SCPWL) model based digital predistorters are widely employed to compensating the nonlinear distortion that introduced by a HPA component in OFDM technology. In this paper, the genetic algorithm has been used to optimized the SCPWL coefficients by using Matlab 2015b, and then the Bit Error Rate (BER) performance has been evaluated for OFDM signal with 16-QAM and 64-QAM modulations in three cases, with nonlinear effects, without nonlinear effects (ideal case), with SCPWL and with nonlinear effects (compensated case)). The simulation results showed that the predistorter that adjusted by the genetic algorithm accomplishes huge execution change by successfully compensating the nonlinearity and reducing the input and output back-off (IBO, OBO) of the HPA.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Robot Arm Path Planning Using Modified Particle Swarm Optimization based on D* algorithm
...Show More Authors

Abstract

Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Us-china Public Administration
Victims of Terrorism between Compensation and Loss of Rights: A Comparative Study between Iraqi Law and French Law
...Show More Authors

The problem of the damage caused by terrorist acts has raised many difficulties in many countries, including Iraq, which requires the existence of a law that sets out sufficient rules for compensating the victims of terrorist acts, in order to compensate them for the harm they have not suffered. It may be difficult or impossible for them to identify causing damage, and therefore unable to obtain compensation by applying the traditional rules of liability that require proof of fault and identify the culprit. The security funds come as an appropriate alternative that pays compensation in such cases for victims to reparation for the damage they suffered. Therefore, this problem remains one of the most problems that Iraq suffers from it, which

... Show More
View Publication
Publication Date
Tue Jun 12 2007
Journal Name
Iraqi Journal Of Laser
Incident Laser Power and Concentration Effects on the Fluorescence of DCM Dye in PMMA Polymer
...Show More Authors

Incident laser power and concentration effects on fluorescence emission from DCM dye in PMMA polymer have been investigated. Different concentrations of the dye were used. It was found that the fluorescence intensity increased with increasing of the concentration of the dye, with a red shift. In addition, it was found that the fluorescence intensity increased with the increase of the incident laser power I0.

View Publication Preview PDF
Publication Date
Thu Jun 29 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications (ijnaa)
Applying a suitable approximate-simulation technique of an epidemic model with random parameters
...Show More Authors

Because the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulat

... Show More
Publication Date
Tue Mar 01 2016
Journal Name
Optics Communications
Temperature effect on nonlinear refractive indices of liquid crystals in visible and NIR
...Show More Authors

View Publication
Scopus (12)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Iraqi Journal Of Laser
Investigation of Size-dependent Nonlinearity of Ag Nano-Fluids using Self-defocusing Technique
...Show More Authors

In this work, the effect of different particle size on the nonlinear optical properties of silver nanoparticles in de-ionized water was studied. The experimental observation of the far field diffraction patterns by CCD camera in two and three dimensions. The maximum change of nonlinear refractive index and the relative phase shift were calculated. The self-defocusing technique was used with a continuous-wave radiation from DPSS Blue laser .The wavelength is 473 nm with an output power of 270 mW. All the Ag colloids samples containing the sizes 15, 30, 50, and 70 nm of silver nanoparticles used in the study were chemically prepared. It was found that the nonlinear refractive index is a particle size dependent and of the order of 10-7 cm2/

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
First Order Nonlinear Neutral Delay Differential Equations
...Show More Authors

The author obtain results on the asymptotic behavior of the nonoscillatory solutions of first order nonlinear neutral differential equations. Keywords. Neutral differential equations, Oscillatory and Nonoscillatory solutions.

View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Several Nonlinear Estimators for Regression Function
...Show More Authors

The aim of this paper is to estimate a nonlinear regression function of the Export of the crude oil Saudi (in Million Barrels) as a function of the number of discovered fields.

 Through studying the behavior of the data we show that its behavior was not followed a linear pattern or can put it in a known form so far there was no possibility to see a general trend resulting from such exports.

We use different nonlinear estimators to estimate a regression function, Local linear estimator, Semi-parametric as well as an artificial neural network estimator (ANN).

The results proved that the (ANN) estimator is the best nonlinear estimator am

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Novel Approximate Solutions for Nonlinear Blasius Equations
...Show More Authors

The method of operational matrices based on different types of polynomials such as Bernstein, shifted Legendre and Bernoulli polynomials will be presented and implemented to solve the nonlinear Blasius equations approximately. The nonlinear differential equation will be converted into a system of nonlinear algebraic equations that can be solved using Mathematica®12. The efficiency of these methods has been studied by calculating the maximum error remainder ( ), and it was found that their efficiency increases as the polynomial degree (n) increases, since the errors decrease. Moreover, the approximate solutions obtained by the proposed methods are compared with the solution of the 4th order Runge-Kutta method (RK4), which gives very

... Show More
View Publication
Crossref (1)
Crossref