major goal of the next-generation wireless communication systems is the development of a reliable high-speed wireless communication system that supports high user mobility. They must focus on increasing the link throughput and the network capacity. In this paper a novel, spectral efficient system is proposed for generating and transmitting twodimensional (2-D) orthogonal frequency division multiplexing (OFDM) symbols through 2- D inter-symbol interference (ISI) channel. Instead of conventional data mapping techniques, discrete finite Radon transform (FRAT) is used as a data mapping technique due to the increased orthogonality offered. As a result, the proposed structure gives a significant improvement in bit error rate (BER) performance. The new structure was tested and a comparison of performance for serial one-dimensional (1-D) Radon based OFDM and parallel 2-D Radon based OFDM is made under additive white Gaussian noise (AWGN), flat, and multi-path selective fading channels conditions. It is found that Radon based parallel 2-D OFDM has better speed and performance than serial 1-D Radon based OFDM.
A load flow program is developed using MATLAB and based on the Newton–Raphson method,which shows very fast and efficient rate of convergence as well as computationally the proposed method is very efficient and it requires less computer memory through the use of sparsing method and other methods in programming to accelerate the run speed to be near the real time.
The designed program computes the voltage magnitudes and phase angles at each bus of the network under steady–state operating conditions. It also computes the power flow and power losses for all equipment, including transformers and transmission lines taking into consideration the effects of off–nominal, tap and phase shift transformers, generators, shunt capacitors, sh
In a hybrid cooling solar thermal systems , a solar collector is used to convert solar energy into heat energy in order to super heat the refrigerant leaving the compressor, and this process helps in the transformation of refrigerant state from gaseous state to the liquid state in upper two-thirds of the condenser instead of the lower two-thirds such as in the traditional air-conditioning systems and this will reduce the energy needed to run the process of cooling .In this research two systems with a capacity of 2 tons each were used, a hybrid air-conditioning system with an evacuated tubes solar collector and a traditional air-conditioning system . The refrigerant of each type was R22.The comparison was in the amou
... Show MoreAutonomous systems are these systems which power themselves from the available ambient energies in addition to their duties. In the next few years, autonomous systems will pervade society and they will find their ways into different applications related to health, security, comfort and entertainment. Piezoelectric harvesters are possible energy converters which can be used to convert the available ambient vibration energy into electrical energy. In this contribution, an energy harvesting cantilever array with magnetic tuning including three piezoelectric bimorphs is investigated theoretically and experimentally. Other than harvester designs proposed before, this array is easy to manufacture and insensitive to manufacturi
... Show MoreA field experiment was carried out in one of the orchards of Al-Qassim district in Babel Governorate to find out the ability of a locally manufactured platform to serve palm trees by working in flat and uneven orchard land, palm tree heights of 4, 8, and 12 meters, and it performs pollination, pruning and harvesting services. The time of ascent and descent, the palm service, and the palm/hour productivity were measured. A randomized complete block design with three replications used a split split-plot arrangement. The nature of the land (flat or uneven) represented the main plots, the height of the palm trees (4, 8, 12) meters, the sub-plots, and the palm service operations (pollinati
Smishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random
... Show MoreThe meniscus has a crucial function in human anatomy, and Magnetic Resonance Imaging (M.R.I.) plays an essential role in meniscus assessment. It is difficult to identify cartilage lesions using typical image processing approaches because the M.R.I. data is so diverse. An M.R.I. data sequence comprises numerous images, and the attributes area we are searching for may differ from each image in the series. Therefore, feature extraction gets more complicated, hence specifically, traditional image processing becomes very complex. In traditional image processing, a human tells a computer what should be there, but a deep learning (D.L.) algorithm extracts the features of what is already there automatically. The surface changes become valuable when
... Show MoreCancer is one of the critical health concerns. Health authorities around the world have devoted great attention to cancer and cancer causing factors to achieve control against the increasing rate of cancer. Carcinogens are the most salient factors that are accused of causing a considerable rate of cancer cases. Scientists, in different fields of knowledge, keep warning people of the imminent attack of carcinogens which are surrounding people in the environment and may launch their attack at any moment. The present paper aims to investigate the linguistic construction of the imminent carcinogen attack in English and Arabic scientific discourse. Such an investigation contributes to enhancing the scientists’ awareness of the linguistic co
... Show MoreSocial media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa, a chaotic map. The lightweight encryption algorithm (Rabbit Algorithm), which is a 3D dynamic system, is made more secure by the Attractor of Aizawa. The process separates color images into blocks by first dividing them into bands of red, green, and blue (RGB). The presented approach generates multiple keys, or sequences, based on the initial parameters and conditions, which are
... Show More