Sum Rate Maximization Versus MSE Minimization in FDD Massive MIMO Systems With Short Coherence Time
...Show More Authors
In this paper we used frequentist and Bayesian approaches for the linear regression model to predict future observations for unemployment rates in Iraq. Parameters are estimated using the ordinary least squares method and for the Bayesian approach using the Markov Chain Monte Carlo (MCMC) method. Calculations are done using the R program. The analysis showed that the linear regression model using the Bayesian approach is better and can be used as an alternative to the frequentist approach. Two criteria, the root mean square error (RMSE) and the median absolute deviation (MAD) were used to compare the performance of the estimates. The results obtained showed that the unemployment rates will continue to increase in the next two decade
... Show MoreThe charge transfer at C23H17F8N8O2PRu, C44H30BF4N5O4Ru, C56H52CL5N5OOsP2 and C76H88F80N24O11P10Ru4 nitrosyl complexes are investigation and studies theoretically using the quantum consideration. Charge transfer behavior largely rely to the electric properties of nitrosyl complexes system whose depending on the main important parameters for the transmission rate constant such that: orientation transition energy, overlapping coupling coefficient, driving force energy, height barrier and Temperature T (K). Data results have been evaluated using a MATLAB program. Results show that rate of charge transfer increases due to increases the orientation transition energy.
The objective of this study is to enable the role of modern and advanced computerized information systems. The model or mechanism should be developed by collecting the necessary information about the taxpayers and the sources of the taxpayers' income, on the basis of which the accuracy of the inventory process will be adopted. In addition to studies related to computerized information systems and showing their importance to the tax institution. To achieve the objectives of the study and to answer its questions, the researcher relied on collecting data and information on the subject on the literature and previous studies The secondary sources, which also formed the theoretical framework of the study, were obtained either as a practical fr
... Show MoreAbstract:
One of the important things provided by fuzzy model is to identify the membership functions. In the fuzzy reliability applications with failure functions of the kind who cares that deals with positive variables .There are many types of membership functions studied by many researchers, including triangular membership function, trapezoidal membership function and bell-shaped membership function. In I research we used beta function. Based on this paper study classical method to obtain estimation fuzzy reliability function for both series and parallel systems.
One of the most serious health disasters in recent memory is the COVID-19 epidemic. Several restriction rules have been forced to reduce the virus spreading. Masks that are properly fitted can help prevent the virus from spreading from the person wearing the mask to others. Masks alone will not protect against COVID-19; they must be used in conjunction with physical separation and avoidance of direct contact. The fast spread of this disease, as well as the growing usage of prevention methods, underscore the critical need for a shift in biometrics-based authentication schemes. Biometrics systems are affected differently depending on whether are used as one of the preventive techniques based on COVID-19 pandemic rules. This study provides an
... Show MoreFree-Space Optical (FSO) can provide high-speed communications when the effect of turbulence is not serious. However, Space-Time-Block-Code (STBC) is a good candidate to mitigate this seriousness. This paper proposes a hybrid of an Optical Code Division Multiple Access (OCDMA) and STBC in FSO communication for last mile solutions, where access to remote areas is complicated. The main weakness effecting a FSO link is the atmospheric turbulence. The feasibility of employing STBC in OCDMA is to mitigate these effects. The current work evaluates the Bit-Error-Rate (BER) performance of OCDMA operating under the scintillation effect, where this effect can be described by the gamma-gamma model. The most obvious finding to emerge from the analysis
... Show MoreBackground: The bond strength of the root canal sealers to dentin seems to be a very important property for maintaining the integrity and the seal of root canal filling. The aim of this study was to evaluate the shear bond strength of four different obturation systems using push-out test. Materials and methods: Forty straight palatal roots of the maxillary first molars teeth were used in this study, these roots were instrumented using crown down technique and ProTaper system, instrumentation were done with copious irrigation of 2.5% sodium hypochlorite and 17% buffered solution of EDTA was used as final irrigant followed by distilled water, roots were randomly divided into four groups according to the obturation system (ten teeth for each g
... Show More“Smart city” projects have become fully developed and are actively using video analytics. Our study looks at how video analytics from surveillance cameras can help manage urban areas, making the environment safer and residents happier. Every year hundreds of people fall on subway and railway lines. The causes of these accidents include crowding, fights, sudden health problems such as dizziness or heart attacks, as well as those who intentionally jump in front of trains. These accidents may not cause deaths, but they cause delays for tens of thousands of passengers. Sometimes passers-by have time to react to the event and try to prevent it, or contact station personnel, but computers can react faster in such situations by using ethical
... Show MoreCryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis