Preferred Language
Articles
/
VoZ8soYBIXToZYAL47HT
Multi-Channel Distributed DSA Networks: Connectivity and Rendezvous Tradeoffs
...Show More Authors

In this paper, we investigate and characterize the effects of multi-channel and rendezvous protocols on the connectivity of dynamic spectrum access networks using percolation theory. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from a phenomenon which we define as channel abundance. To cope with the existence of multi-channel, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocols, it becomes difficult for two nodes to agree on a common channel, thereby, potentially remaining invisible to each other. We model this invisibility as a Poisson thinning process and show that invisibility is even more pronounced with channel abundance. Following the disk graph model, we represent the multiple channels as parallel edges in a graph and build a multi-layered graph (MLG) in R2. In order to study the connectivity, we show how percolation occurs in the MLG by coupling it with a typical discrete percolation. Using a Boolean model and the MLG, we study both cases of primaries' absence and presence. For both cases, we define and characterize connectivity of the secondary network in terms of the available number of channels, deployment densities, number of simultaneous transmissions per node, and communication range. When primary users are absent, we derive the critical number of channels which maintains supercriticality of the secondary network. When primary users are present, we characterize and analyze the connectivity for all the regions: channel abundance, optimal, and channel deprivation. For each region we show the requirement and the outcome of using either type of rendezvous techniques. Moreover, we find the tradeoff between deployment-density versus rendezvous probability which results in a connected network. Our results can be used to decide on the goodness of any channel rendezvous algorithm by computing the expected resultant connectivity. They also provide a guideline for achieving connectivity using minimal resources.

Scopus Clarivate Crossref
Publication Date
Fri Oct 01 2010
Journal Name
2010 Ieee Symposium On Industrial Electronics And Applications (isiea)
Distributed t-way test suite data generation using exhaustive search method with map and reduce framework
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
An Asymptotic Analysis of the Gradient Remediability Problem for Disturbed Distributed Linear Systems
...Show More Authors

The goal of this work is demonstrating, through the gradient observation of a   of type linear ( -systems), the possibility for reducing the effect of any disturbances (pollution, radiation, infection, etc.) asymptotically, by a suitable choice of related actuators of these systems. Thus, a class of  ( -system) was developed based on finite time  ( -system). Furthermore, definitions and some properties of this concept -system and asymptotically gradient controllable system ( -controllable) were stated and studied. More precisely, asymptotically gradient efficient actuators ensuring the weak asymptotically gradient compensation system ( -system) of known or unknown disturbances are examined. Consequently, under convenient hypo

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Fri Sep 03 2021
Journal Name
Buildings
Structural Efficiency of Hollow Reinforced Concrete Beams Subjected to Partial Uniformly Distributed Loading
...Show More Authors

Reinforced concrete (RC) beams containing a longitudinal cavity have become an innovative development and advantage for economic purposes of light-weight members without largely affecting their resistance against the applied loads. This type of openings can also be used for maintenance purposes and usage space of communication lines, pipelines, etc. RC beams are primarily loaded in the plane of the members, which are two-dimensional in a plane stress state and the dominant structural behaviours include bending, shear, or combination of both. In the present study, six numerical models of RC beams with and without openings were simulated by using commercial finite element software ANSYS to evaluate the structural behaviours of those b

... Show More
View Publication
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Influence of design anode and cathode channel on (PEMFC) fuel cell performance
...Show More Authors

View Publication
Scopus (16)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sat May 31 2025
Journal Name
Iraqi Journal Of Science
UNSTEADY PRESSURE DROP AND HEAT TRANSFER OFMAGNETOHYDRODYNAMIC ANNULAR TWO-PHASE INRECTANGULAR CHANNEL
...Show More Authors

An annular two-phase, steady and unsteady, flow model in which a conductingfluid flow under the action of magnetic field is concavely. Two models arepresented, in the model one; the magnetic field is perpendicular to the long side ofthe channel, while in the model two is perpendicular to the short side. Also, westudy, to some extent the single-phase liquid flow.It is found that the motion and heat transfer equations are controlled by differentdimensionless parameters namely, Reynolds, Hartmann, Prandtl, and Poiseuilleparameters. The Laplace transform technique is used to solve each of the motion andheat transfer equations. The effects of each of dimensionless parameters upon thevelocity and heat transfer is analyzed.A comprehensive study fo

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
University Of Baghdad, College Of Education For Pure Sciences / Ibn Al-haitham, Department Of Mathematics
Fibrewise Multi-Topological Spaces and Related Concepts
...Show More Authors

We define and study new ideas of fibrewise topological space namely fibrewise multi-topological space . We also submit the relevance of fibrewise closed and open topological space . Also fibrewise multi-locally sliceable and fibrewise multi-locally section able multi-topological space . Furthermore, we propose and prove a number of statements about these ideas. On the other hand, extend separation axioms of ordinary topology into fibrewise setting. The separation axioms are said to be fibrewise multi-T0. spaces, fibrewise multi-T1spaces, fibrewise multi-R0 spaces, fibrewise multi-Hausdorff spaces, fibrewise multi-functionally Hausdorff spaces, fibrewise multi-regular spaces, fibrewise multi-completely regular spaces, fibrewise multi-normal

... Show More
Publication Date
Sat Apr 01 2017
Journal Name
Al – Bahith Al – A A‚lami
Gender Profiling of ads in Egyptian Channel MBC
...Show More Authors

The study begins with the idea that advertising is a form of culture. Therefore, it is not possible to be surrounded by an actual briefing from one-sided premises such as those that are based solely on the artistic, aesthetic or technical aspects, without linking it to the culture in which it is produced. The researcher attempts to shed light on the relation between the advertising letter and the concept of gender. And here lies the importance of the research as the content of the ads and their form and implicit values in the text and image reflect the cultural values that must be identified as well as the most important roles that are stereotyped in advertisements and their relationship to the culture of society. Advertising is an importan

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Al–bahith Al–a'alami
Gender Profiling of ads in Egyptian Channel MBC
...Show More Authors

The study begins with the idea that advertising is a form of culture. Therefore, it is not possible to be surrounded by an actual briefing from one-sided premises such as those that are based solely on the artistic, aesthetic or technical aspects, without linking it to the culture in which it is produced.
The researcher attempts to shed light on the relation between the advertising letter and the concept of gender. And here lies the importance of the research as the content of the ads and their form and implicit values in the text and image reflect the cultural values that must be identified as well as the most important roles that are stereotyped in advertisements and their relationship to the culture of society.
Advertising is

... Show More
View Publication Preview PDF
Crossref