Preferred Language
Articles
/
pxb3CocBVTCNdQwCSTLF
Mobile position estimation using artificial neural network in CDMA cellular systems
...Show More Authors

Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The results show that the neural network has good performance compared with two other analytical methods which are average positioning method and optimal positioning method

Publication Date
Tue Jan 03 2023
Journal Name
College Of Islamic Sciences
The position of the Jews on divinity, lordship, names and attributes
...Show More Authors

Judaism followed the approach of monotheism after God Almighty sent Moses (peace be upon him) to convey to them the messages of their Lord, so that they might be on a right guidance and path, but the people did not follow that path.” Love of matter and faith in what is witnessed, so they portrayed the Lord in several images in line with what their souls drew upon them.

View Publication Preview PDF
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
Administrative Applications of Expert Systems in Educational Leadership Departments in the Light of the Systems Approach
...Show More Authors

Abstract

The aim of the current research is to identify the level of administrative applications of expert systems in educational leadership departments in light of the systems approach. To achieve the objectives of the research, the descriptive-analytical and survey method was adopted. The results showed that the level of availability of the knowledge base for expert systems in educational leadership departments (as inputs) was low. The level of availability of resources and software for expert systems in educational leadership departments (as transformational processes) came to be low, as well as the level of availability of the user interface for expert systems in educational leadership departments (as outputs

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Communications
SDN Implementation in Data Center Network
...Show More Authors

View Publication
Scopus (16)
Crossref (10)
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Reading of teacher s role and position in Ibn -Al - Kateeb s book , acquaintance
...Show More Authors

0

View Publication Preview PDF
Publication Date
Tue Mar 31 2020
Journal Name
College Of Islamic Sciences
The position of women In Literary Literature Models of the Arabic and Kurdish literature
...Show More Authors

This research deals with the topic of "the status of women" in the literature of Sufism. The researcher cites a bundle of mystical yarns, and examples of verses and poems from this high literature that look at women with reverence and appreciation. The researcher tried to find an appropriate explanation and away from the arbitrariness of the symbols used by the poets of Islamic Sufism In their poems.

    The research is considered a comparative study of the Arabic and Kurdish dialects, by selecting six famous poets from the literature of literature, three of them from Arabic literature, and the other three from Kurdish literature, so the research is di

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
College Of Islamic Sciences
The position of women In Literary Literature Models of the Arabic and Kurdish literature
...Show More Authors

This research deals with the topic (the position of women) in the literature literature, and the researcher cites a bouquet of woolen yarn, examples of verses and poems from this fine literature that looks at the woman with respect and appreciation. In their poems.
The research is a comparative search for Arab and Kurdish literature, by selecting six famous poets in the literature, three of them are from Arabic literature, and the other three are from Kurdish literature, and thus the research is divided into two subjects and six demands.
Finally, the researcher tried to set a brick that would be an entry point to find an indicative explanation and a suitable explanation that would break those symbols and signs that caused the exp

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 19 2015
Journal Name
Al-academy
Employment aesthetic to the sitting position in contemporary Iraqi Sculpture: سلام محمد سعيد هاشم
...Show More Authors

This paper deals with aesthetic and a sitting position in contemporary Iraqi sculpture and studied this situation, an analytical study to reveal how to employ them in aesthetically pleasing work of art has been research in a sitting position to a lack of technical library for such research, this study includes four chaptersChapter I contains the research problem and its importance in terms of the released address and its objectives in the detection of this situation, how to employ the HDL research is to detect how the aesthetic of the Employment sit position and limits Find business is bronze and stone-dimensional exclusively carried out from 2000 to 2009 AD.Chapter II included the Framework theory and previous studies and with three Inv

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Estimation of nonparametric regression function using shrinkage wavelet and different mother functions
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I
...Show More Authors

     In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used:  local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the

... Show More
View Publication Preview PDF