Performance Enhancement of LDPC Codes Based on Protograph Construction in 5G-NR Standard

Aymen M. Al-Kadhimi, Ammar E. Abdulkareem, Charalampos C. Tsimenidis

1-10

DOI: https://doi.org/10.25130/tjes.30.4.1

Single Phasing Effects on the Behavior of Three-Phase Induction Motor

Layth Fadhil Abbas, Riemann Essa Ahmed Ahmed, Omer N. Mahmmoud, Khalaf Gaeid , Hazlie Bin Mokhlis

11-18

DOI: https://doi.org/10.25130/tjes.30.4.2
DOI: https://doi.org/10.25130/tjes.30.4.3
DOI: https://doi.org/10.25130/tjes.30.4.4
DOI: https://doi.org/10.25130/tjes.30.4.5

Optimal Fuzzy-FOPID, Fuzzy-PID Control Schemes for Trajectory Tracking of 3DOF Robot Manipulator

Worod Adris Shatnan, Muhanad D. Hashim Almawlawe, Mustafa Abd AL-Aress Jabur

46-53

DOI: https://doi.org/10.25130/tjes.30.4.6
DOI: https://doi.org/10.25130/tjes.30.4.7
DOI: https://doi.org/10.25130/tjes.30.4.8

Application of Machine Learning for Daily Forecasting Dam Water Levels

Mohammad Abdullah Almubaidin, Ali Najah Ahmed, Chris Aaron Anak Winston , Ahmed El-Shafie

74-87

DOI: https://doi.org/10.25130/tjes.30.4.9
DOI: https://doi.org/10.25130/tjes.30.4.10
DOI: https://doi.org/10.25130/tjes.30.4.11
DOI: https://doi.org/10.25130/tjes.30.4.12

New Algorithm for Real-Valued Fourier Transform

Sukaina K. Salih, Mounir T. Hamood

127-133

DOI: https://doi.org/10.25130/tjes.30.4.13

Suggested Scenarios of Initial Filling for the Badush Reservoir, Iraq

Maha Shahir Badawy, Sabbar Abdullah Saleh, Mohammed Rashid Abbood

134-144

DOI: https://doi.org/10.25130/tjes.30.4.14
DOI: https://doi.org/10.25130/tjes.30.4.15

An End-to-End Security Scheme for Protection from Cyber Attacks on Internet of Things (IoT) Environment

Ahamd Khader Habboush, Bassam Mohammed Elzaghmouri, Binod Kumar Pattanayak, Saumendra Pattnaik, Rami Ahmad Habboush

153-158

DOI: https://doi.org/10.25130/tjes.30.4.16
DOI: https://doi.org/10.25130/tjes.30.4.17