In cognitive radio system, the spectrum sensing has a major challenge in needing a sensing method, which has a high detection capability with reduced complexity. In this paper, a low-cost hybrid spectrum sensing method with an optimized detection performance based on energy and cyclostationary detectors is proposed. The method is designed such that at high signal-to-noise ratio SNR values, energy detector is used alone to perform the detection. At low SNR values, cyclostationary detector with reduced complexity may be employed to support the accurate detection. The complexity reduction is done in two ways: through reducing the number of sensing samples used in the autocorrelation process in the time domain and through using the Slid
... Show More
Abstract
Suffering the human because of pressure normal life of exposure to several types of heart disease as a result of due to different factors. Therefore, and in order to find out the case of a death whether or not, are to be modeled using binary logistic regression model
In this research used, one of the most important models of nonlinear regression models extensive use in the modeling of applications statistical, in terms of heart disease which is the binary logistic regression model. and then estimating the parameters of this model using the statistical estimation methods, another problem will be appears in estimating its parameters, as well as when the numbe
... Show MoreThe love of the world and its lusts are the head of sins and the corruptors of religion, and the one who loves and loves them who prefers them over the hereafter is one of the most pitiful of creation, and the least intelligent of them, as he prefers imagination over reality, sleep over wakefulness, fleeting shadow over eternal bliss and the mortal abode over the eternal abode, and he sold the life of eternity for the most luxurious life. In life, it is dreams and sleep or as a fleeting shadow, and as it was said: The intelligent person is not deceived.
The reason for choosing this topic is due to two things:
The first: When I contemplated the reasons for the differences and conflicts that afflicted our wounded and occupied country
The research sought to identify the objective trends of postgraduate students at the College of Political Science - University of Baghdad for the period from 2000-2012 through the objective trends of university theses and dissertations and what are the most and least studied topics, with a re-adjustment of previously studied topics towards topics that serve issues of concern to society and avoiding topics that have been studied a lot to avoid repetition. The research came out with the following results, the most prominent of which are: The total number of what was accomplished in this college is 401 theses and dissertations, and the dissertations had the largest share of them, as their percentage reached 69%, with 275 theses compared to 126
... Show MoreOptical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreMany of accurate inertial guided missilc systems need to use more complex mathematical calculations and require a high speed processing to ensure the real-time opreation. This will give rise to the need of developing an effcint
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show More