In this paper, several combination algorithms between Partial Update LMS (PU LMS) methods and previously proposed algorithm (New Variable Length LMS (NVLLMS)) have been developed. Then, the new sets of proposed algorithms were applied to an Acoustic Echo Cancellation system (AEC) in order to decrease the filter coefficients, decrease the convergence time, and enhance its performance in terms of Mean Square Error (MSE) and Echo Return Loss Enhancement (ERLE). These proposed algorithms will use the Echo Return Loss Enhancement (ERLE) to control the operation of filter's coefficient length variation. In addition, the time-varying step size is used.The total number of coefficients required was reduced by about 18% , 10% , 6%
... Show MoreEleven new 2,6-di-tert-butyl-4-(5-aryl-1,3,4-oxadiazol-2-yl)phenols 5a–k were synthesized by reacting aryl hydrazides with 3,5-di-tert butyl 4-hydroxybenzoic acid in the presence of phosphorus oxychloride. The resulting compounds were characterized based on their IR, 1H-NMR, 13C-NMR, and HRMS data. 2,2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) assays were used to test the antioxidant properties of the compounds. Compounds 5f and 5j exhibited significant free-radical scavenging ability in both assays.
Specimens of the sesarmid crab Nanonsesarma sarii (Naderloo and Türkay 2009) were collected from the intertidal zone of Khor Al-Zubair, Basrah, Iraq 2012 far from the Arabian Gulf coasts. Morphological features of this species are highlighted and a figure is provided.
Many complexes of 3,5-dimethyl-1H-pyrazol-1-yl phenyl methanone with Cr(III), Co(II), Ni(II), Cu(II) and Cd(II) were synthesized and characterized by FT-IR, UV/visible spectra, elemental analysis, room temperature magnetic susceptibility and molar conductivity. Cd(II) complex was expected to have tetrahedral structure while all the other complexes were expected to have an octahedral structure.
The new ligand [N1,N4-bis((1H-benzo[d]Glyoxalin-2-yl)carbamothioyl)Butanedi amide] (NCB) derived from Butanedioyl diisothiocyanate with 2-aminobenz imidazole was used to prepare a chain of new metal complexes of Cr(III), Mn(II), Co(II), Ni(II), Cu(II), Pd(II), Ag(I), Cd(II) by general formula [M(NCB)]Xn ,Where M= Cr(III), n=3, X=Cl; Mn(II), Co(II), Ni(II), Cu(II), Pd(II), Cd(II) ,n=2 , X=Cl; Ag(I), n=1, X=NO3. Characterized compounds on the basis of 1H, 13CNMR (for (NCB), FT-IR and U.V spectrum, melting point, molar conduct, %C, %H, %N and %S, the percentage of the metal in complexes %M, Magnetic susceptibility, thermal studies (TGA),while its corrosion inhibition for mild steel in Ca(OH)2 solution is studied by weight loss. These measureme
... Show Morerhabditid Mesorhabditis franseni Fuchs, 1933 (Family, Mesorhabditidae) and pratylenchid nematode Pratylenchus goodeyi Sher and Allen, 1953 (Family, Pratylenchidae). They were illustrated by molecular aspects. All specimens of both genera were cultured and reproduced for DNA extraction. M. franseni (IRQ.ZAh2 PP528819.1 isolate) was characterized. P. goodeyi (IRQ.ZAh5 PP535537 isolate) was also characterized. Selected specimens of these two species were molecularly characterized using the partial ITS-rRNA gene sequences. The ITS-rRNA sequence of IRQ.ZAh2 PP528819.1 isolate had a range of (98.62%-100%) sequence homology with ITS-rRNA sequence of M. franseni available in NCBI database. While, the ITS-rRNA sequence of IRQ.ZAh5 PP535537 isolate h
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More