In this paper, we investigate and characterize the effects of multi-channel and rendezvous protocols on the connectivity of dynamic spectrum access networks using percolation theory. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from a phenomenon which we define as channel abundance. To cope with the existence of multi-channel, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocols, it becomes difficult for two nodes to agree on a common channel, thereby, potentially remaining invisible to each other. We model this invisibility as a Poisson thinning process and show that invisibility is even more pronounced with channel abundance. Following the disk graph model, we represent the multiple channels as parallel edges in a graph and build a multi-layered graph (MLG) in R2. In order to study the connectivity, we show how percolation occurs in the MLG by coupling it with a typical discrete percolation. Using a Boolean model and the MLG, we study both cases of primaries' absence and presence. For both cases, we define and characterize connectivity of the secondary network in terms of the available number of channels, deployment densities, number of simultaneous transmissions per node, and communication range. When primary users are absent, we derive the critical number of channels which maintains supercriticality of the secondary network. When primary users are present, we characterize and analyze the connectivity for all the regions: channel abundance, optimal, and channel deprivation. For each region we show the requirement and the outcome of using either type of rendezvous techniques. Moreover, we find the tradeoff between deployment-density versus rendezvous probability which results in a connected network. Our results can be used to decide on the goodness of any channel rendezvous algorithm by computing the expected resultant connectivity. They also provide a guideline for achieving connectivity using minimal resources.
The properties of capturing of peristaltic flow to a chemically reacting couple stress fluid through an inclined asymmetric channel with variable viscosity and various boundaries are investigated. we have addressed the impacts of variable viscosity, different wave forms, porous medium, heat and mass transfer for peristaltic transport of hydro magnetic couple stress liquid in inclined asymmetric channel with different boundaries. Moreover, The Fluid viscosity assumed to vary as an exponential function of temperature. Effects of almost flow parameters are studied analytically and computed. An rising in the temperature and concentration profiles return to heat and mass transfer Biot numbers. Noteworthy, the Soret and Dufour number effect resul
... Show Morein the present article, we present the peristaltic motion of “Hyperbolic Tangent nanofluid” by a porous area in a two dimensional non-regular a symmetric channel with an inclination under the impact of inclination angle under the impact of inclined magnetic force, the convection conditions of “heat and mass transfer” will be showed. The matter of the paper will be further simplified with the assumptions of long wave length and less “Reynolds number”. we are solved the coupled non-linear equations by using technical analysis of “Regular perturbation method” of series solutions. We are worked out the basic equations of continuity, motion, temperature, and volume fraction
Community detection is useful for better understanding the structure of complex networks. It aids in the extraction of the required information from such networks and has a vital role in different fields that range from healthcare to regional geography, economics, human interactions, and mobility. The method for detecting the structure of communities involves the partitioning of complex networks into groups of nodes, with extensive connections within community and sparse connections with other communities. In the literature, two main measures, namely the Modularity (Q) and Normalized Mutual Information (NMI) have been used for evaluating the validation and quality of the detected community structures. Although many optimization algo
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreThis research asks what are negative social behaviours in the Kurdistan Region of Iraq (KRI) raised by the talk shows on the (NRT) channel? Furthermore, it aims to identify the most significant themes addressed by talk shows on the (NRT) channel regarding negative social behaviours in the KRI by using the content analysis approach through non-random purposive sampling to understand the dialogue contents that dealt with this subject. This study has reached a set of results: through its talk shows, the (NRT) channel attempts to create a media vision about the spread of negative social behaviours in the KRI and stand up to the dangers associated with these behaviours. At the same time, those programs tried to marginalize the behaviours that
... Show Moreproduction of the spot in the news channels - a study of patterns of spot media used in the production of spring breaks Arab Al-Arabiya
The spacers news in Arabic, one of the messages that seek channel output are fit and policy on the one hand and meet the needs of viewers for information intensive and image influential to find out the latest developments on the Arab arena, especially the Syrian revolution on the other and thus The viewer for the type of coverage the stomach through a newsletter about the event on the one hand to keep following up on her and eager to watch the other hand
And sou
... Show MoreMost Internet of Vehicles (IoV) applications are delay-sensitive and require resources for data storage and tasks processing, which is very difficult to afford by vehicles. Such tasks are often offloaded to more powerful entities, like cloud and fog servers. Fog computing is decentralized infrastructure located between data source and cloud, supplies several benefits that make it a non-frivolous extension of the cloud. The high volume data which is generated by vehicles’ sensors and also the limited computation capabilities of vehicles have imposed several challenges on VANETs systems. Therefore, VANETs is integrated with fog computing to form a paradigm namely Vehicular Fog Computing (VFC) which provide low-latency services to mo
... Show More