Preferred Language
Articles
/
pRfUXJIBVTCNdQwC162_
Design and Simulation of parallel CDMA System Based on 3D-Hadamard Transform
...Show More Authors

Future wireless systems aim to provide higher transmission data rates, improved spectral efficiency and greater capacity. In this paper a spectral efficient two dimensional (2-D) parallel code division multiple access (CDMA) system is proposed for generating and transmitting (2-D CDMA) symbols through 2-D Inter-Symbol Interference (ISI) channel to increase the transmission speed. The 3D-Hadamard matrix is used to generate the 2-D spreading codes required to spread the two-dimensional data for each user row wise and column wise. The quadrature amplitude modulation (QAM) is used as a data mapping technique due to the increased spectral efficiency offered. The new structure simulated using MATLAB and a comparison of performance for serial one-dimensional (1-D) CDMA and parallel (2-D) CDMA is made under Additive White Gaussian Noise (AWGN), flat fading and multi-path selective fading channels conditions. It is found that 2-D CDMA has better speed and performance than serial 1-D CDMA.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 19 2016
Journal Name
Spie Proceedings
Simulation of push-pull inverter using wide bandgap devices
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Mar 14 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Mathematical simulation of memristive for classification in machine learning
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Mar 19 2019
Journal Name
Political Sciences Journal
Rules and steps The design of university research projects
...Show More Authors

Research is a study conducted by a researcher or a group of researchers to uncover ambiguity, complete a knowledge, or define a relationship, Solve a problem, or answer a question by carefully investigating the comprehensive and in-depth examination of the evidence and evidence related to this knowledge, revealing a relationship, or solving a problem, or answering a question, to be a systematic, In evidence and evidence that reveal facts and general rules, relationships or solutions, in addition to providing knowledge Human rights are verifiable, tested and confirmed. The university research (graduate research, master's thesis, doctoral dissertation) is the most important type of research, and it is supposed to be the best one, since it

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Engineering And Applied Sciences
Design and Implementation of Electronic Infrastructure for Academic Establishment
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jul 10 2023
Journal Name
Journal Of Engineering
Design and Implementation of Single-Phase Boost PFC Converter
...Show More Authors

In this paper, a single-phase boost type ac-dc converter with power factor correction (PFC) technique is designed and implemented. A current mode control at a constant switching frequency is used as a control strategy for PFC converter. The PFC converter is a single-stage singleswitch boost converter that uses a current shaping technique to reshape the non-sinusoidal input current drawn by the bulky capacitor in the conventional rectifier. This technique should provide an input current with almost free-harmonics, comply with the IEC61000-3-2 limits, and a system operates with near unity power factor. The other function of the boost converter that should be
accomplished is to provide a regulated DC output voltage. The complete designed

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 10 2017
Journal Name
Al-academy
Form and function in the design of intellectual toys
...Show More Authors

Playing is the only common language among children in every place and time, to the fact that what distinguishes the children is their quest to play and fun way innate, not acquired, which is expressed with the child really is one of the rights. And play a key entrance to the growth of the child mentally, intellectually and cognitively and not for the child emotionally and socially just. In the play the child begins to identify and classify objects and learn concepts and circulate among themselves on a linguistic basis. Activity here and play a major role in leading the linguistic development of the child in the composition has the communication skills.

The Games (especially intellectual ones) Whatever the cause of the development

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Text Classification Based on Weighted Extreme Learning Machine
...Show More Authors

The huge amount of documents in the internet led to the rapid need of text classification (TC). TC is used to organize these text documents. In this research paper, a new model is based on Extreme Machine learning (EML) is used. The proposed model consists of many phases including: preprocessing, feature extraction, Multiple Linear Regression (MLR) and ELM. The basic idea of the proposed model is built upon the calculation of feature weights by using MLR. These feature weights with the extracted features introduced as an input to the ELM that produced weighted Extreme Learning Machine (WELM). The results showed   a great competence of the proposed WELM compared to the ELM. 

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 26 2021
Journal Name
2021 Ieee International Conference On Automatic Control & Intelligent Systems (i2cacis)
Vulnerability Assessment on Ethereum Based Smart Contract Applications
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Improve topic modeling algorithms based on Twitter hashtags
...Show More Authors
Abstract<p>Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned</p> ... Show More
View Publication
Scopus (18)
Crossref (16)
Scopus Crossref