Future wireless systems aim to provide higher transmission data rates, improved spectral efficiency and greater capacity. In this paper a spectral efficient two dimensional (2-D) parallel code division multiple access (CDMA) system is proposed for generating and transmitting (2-D CDMA) symbols through 2-D Inter-Symbol Interference (ISI) channel to increase the transmission speed. The 3D-Hadamard matrix is used to generate the 2-D spreading codes required to spread the two-dimensional data for each user row wise and column wise. The quadrature amplitude modulation (QAM) is used as a data mapping technique due to the increased spectral efficiency offered. The new structure simulated using MATLAB and a comparison of performance for serial one-dimensional (1-D) CDMA and parallel (2-D) CDMA is made under Additive White Gaussian Noise (AWGN), flat fading and multi-path selective fading channels conditions. It is found that 2-D CDMA has better speed and performance than serial 1-D CDMA.
After the outbreak of COVID-19, immediately it converted from epidemic to pandemic. Radiologic images of CT and X-ray have been widely used to detect COVID-19 disease through observing infrahilar opacity in the lungs. Deep learning has gained popularity in diagnosing many health diseases including COVID-19 and its rapid spreading necessitates the adoption of deep learning in identifying COVID-19 cases. In this study, a deep learning model, based on some principles has been proposed for automatic detection of COVID-19 from X-ray images. The SimpNet architecture has been adopted in our study and trained with X-ray images. The model was evaluated on both binary (COVID-19 and No-findings) classification and multi-class (COVID-19, No-findings
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreWater level and distribution is very essential in almost all life aspects. Natural and artificial lakes represent a large percentage of these water bodies in Iraq. In this research the changes in water levels are observed by calculating the areas of five different lakes in five different regions and two different marshes in two different regions of the country, in a period of 12 years (2001 - 2012), archived remotely sensed images were used to determine surface areas around lakes and marshes in Iraq for the chosen years . Level of the lakes corresponding to satellite determined surface areas were retrieved from remotely sensed data .These data were collected to give explanations on lake level and surface area fluctuations. It is imp
... Show MoreIn this research, beam expander, BEX, is explained and designed for illuminating the
remote flying target. The BEX is optically designed to be suited for Nd:YAG laser of given
specifications. The BEX is modified to be zoom one to meet the conditions of preventing the
receiving unit; i.e the photodetector, from getting saturated at near and far laser tracking.
Decollimation could be achieved by automatic motor, which controls zoom lens of the BEX
according to the required expansion ratio of beam expander
The search is an application for one of the problems of mathematics in the computer; as providing construction and design of a major program to calculate the inverse permutations of the symmetric group Sn , where 1 ≤ n ≤ 13; using some of the methods used in the Number Theory by computer . Also the research includes design flow chart for the main program and design flow chart for the program inverse permutations and we give some illustrative examples for different symmetric groups and their inverse permutations.
Education quality evaluation is one of the objectives of education quality. The evaluation includes assessing the education standards and academic program outcomes to develop intellectual, scientific and practical concepts for the educational structure. It considers the determination of the rates of the number of accepted students and graduates. The research focuses on "what are the levels of education quality according to the evaluation mechanisms in the design department" to enhance the quality system and the objectives of theoretical and applied education.
It is identifying the levels of education quality and evaluating it according to the numbers and rates of graduate students of the design department branches for morning and ev
This study investigates the implementation of Taguchi design in the estimation of minimum corrosion rate of mild-steel in cooling tower that uses saline solution of different concentration. The experiments were set on the basis of Taguchi’s L16 orthogonal array. The runs were carried out under different condition such as inlet concentration of saline solution, temperature, and flowrate. The Signal-to- Noise ratio and ANOVA analysis were used to define the impact of cooling tower working conditions on the corrosion rate. A regression had been modelled and optimized to identify the optimum level for the working parameters that had been founded to be 13%NaCl, 35ᴼC, and 1 l/min. Also a confirmation run to establish the p
... Show MoreAccurate calculation of transient overvoltages and dielectric stresses from fast-front excitations is required to obtain an optimal dielectric design of power components subjected to these conditions, which are commonly due to switching and lightning, as well as utilization of power-electronic devices. Toroidal transformers are generally used at the low voltage level. However, recent investigations and developments have explored their use at the medium voltage level. This paper analyzes the model-based improvement of the insulation design of medium voltage toroidal transformers. Lumped and distributed parameter models are used and compared to predict the transient response and dielectric stress along the transformer winding. The parameters
... Show More