Preferred Language
Articles
/
VoZ8soYBIXToZYAL47HT
Multi-Channel Distributed DSA Networks: Connectivity and Rendezvous Tradeoffs
...Show More Authors

In this paper, we investigate and characterize the effects of multi-channel and rendezvous protocols on the connectivity of dynamic spectrum access networks using percolation theory. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from a phenomenon which we define as channel abundance. To cope with the existence of multi-channel, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocols, it becomes difficult for two nodes to agree on a common channel, thereby, potentially remaining invisible to each other. We model this invisibility as a Poisson thinning process and show that invisibility is even more pronounced with channel abundance. Following the disk graph model, we represent the multiple channels as parallel edges in a graph and build a multi-layered graph (MLG) in R2. In order to study the connectivity, we show how percolation occurs in the MLG by coupling it with a typical discrete percolation. Using a Boolean model and the MLG, we study both cases of primaries' absence and presence. For both cases, we define and characterize connectivity of the secondary network in terms of the available number of channels, deployment densities, number of simultaneous transmissions per node, and communication range. When primary users are absent, we derive the critical number of channels which maintains supercriticality of the secondary network. When primary users are present, we characterize and analyze the connectivity for all the regions: channel abundance, optimal, and channel deprivation. For each region we show the requirement and the outcome of using either type of rendezvous techniques. Moreover, we find the tradeoff between deployment-density versus rendezvous probability which results in a connected network. Our results can be used to decide on the goodness of any channel rendezvous algorithm by computing the expected resultant connectivity. They also provide a guideline for achieving connectivity using minimal resources.

Scopus Clarivate Crossref
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Extending Wi-Fi Direct Single-Group Network to Multi-Group Network Based on Android Smartphone
...Show More Authors

Nowadays, a very widespread of smartphones, especially Android smartphones, is observed. This is due to presence of many companies that produce Android based phones and provide them to consumers at reasonable prices with good specifications. The actual benefit of smartphones lies in creating communication between people through the exchange of messages, photos, videos, or other types of files. Usually, this communication is through the existence of an access point through which smartphones can connect to the Internet. However, the availability of the Internet is not guaranteed in all places and at all times, such as in crowded places, remote areas, natural disasters, or interruption of the Internet connection for any reason. To create a

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Feb 16 2022
Journal Name
Iraqi Journal Of Science
Collision Avoidance Using Cat Swarm Algorithm for Multi Mobile Robot Path Planning in Dynamic Environment
...Show More Authors

In this paper, we proposed a hybrid control methodology using improved artificial potential field with modify cat swarm algorithm to path planning of decoupled multi-mobile robot in dynamic environment. The proposed method consists of two phase: in the first phase, Artificial Potential Field method (APF) is used to generate path for each one of robots and avoided static obstacles in environment, and improved this method to solve the local minimum problem by using A* algorithm with B-Spline curve while in the second phase, modify Cat Swarm Algorithm (CSA) is used to control collision that occurs among robots or between robot with movable obstacles by using two behaviour modes: seek mode and track mode. Experimental results show that the p

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Study of Multi-drug Resistant Mechanism inAcinetobacterbaumannii Isolated From Nosocomial Infections in Educational Ramadi Hospital
...Show More Authors

In this study, A 320 clinical specimens were collected
fromIntensiveCareUnits, Surgery and burn units in educational Ramadi
hospital. The enrichment and isolation of A. baumannii from collected
specimens led to isolate 30 bacterial strains from 337 bacterial isolates with
rate (8.9%), which similar in morphology for that standard strains. The rate
of A. baumannii isolated from burn specimens was 80%, the wound specimens (13.33%), and sputum (6.67% The study detect resistance of A.
baumanniifor different antibiotics, All isolates showed multidrug resistant,
the isolates was 100% resistant for Ampicillin, Cefazolin, Cefotaxime,
Cloxacillin, Colistin and Trimethoprim, as showed high resistance to
carbapenems reach

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Fuzzy Multi-Objective Capacitated Transportation Problem with Mixed Constraints using different forms of membership functions
...Show More Authors

In this research, the problem of multi- objective modal transport was formulated with mixed constraints to find the optimal solution. The foggy approach of the Multi-objective Transfer Model (MOTP) was applied. There are three objectives to reduce costs to the minimum cost of transportation, administrative cost and cost of the goods. The linear membership function, the Exponential membership function, and the Hyperbolic membership function. Where the proposed model was used in the General Company for the manufacture of grain to reduce the cost of transport to the minimum and to find the best plan to transfer the product according to the restrictions imposed on the model.

View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
Prediction of Pressure Profile During Multi-Phase Flow in Different Oil Well: A Comparative Study
...Show More Authors

Multiphase flow is a very common phenomenon in oil wells. Several correlation models, either analytical or experimental, have been investigated by various studies to investigate this phenomenon. However, no single correlation model was found to produce good results in all flow conditions. 14 models available on the Prosper software were selected for the purpose of calculating the pressure gradient inside wells within a range of different flow conditions. The pressure gradient was calculated using Prosper software, then compared with the measured gradient based on the production log test (PLT) data. This study was conducted on 31 wells from five different oil fields (Kirkuk, Jambur, Bai-Hassan, Al-Ahdab, and Rumaila). It is worth noting t

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 05 2017
Journal Name
International Journal Of Science And Research (ijsr)
Multi Response Optimization of Submerged Arc Welding Using Taguchi Fuzzy Logic Based on Utility Theory
...Show More Authors

Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
Elliptic Curve Cryptography Performance Evaluation for Securing Multi-Factor Systems in a Cloud Computing Environment
...Show More Authors

     In the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Fri Nov 26 2021
Journal Name
Nanomaterials
Solidification Enhancement in a Multi-Tube Latent Heat Storage System for Efficient and Economical Production: Effect of Number, Position and Temperature of the Tubes
...Show More Authors

Thermal energy storage is an important component in energy units to decrease the gap between energy supply and demand. Free convection and the locations of the tubes carrying the heat-transfer fluid (HTF) have a significant influence on both the energy discharging potential and the buoyancy effect during the solidification mode. In the present study, the impact of the tube position was examined during the discharging process. Liquid-fraction evolution and energy removal rate with thermo-fluid contour profiles were used to examine the performance of the unit. Heat exchanger tubes are proposed with different numbers and positions in the unit for various cases including uniform and non-uniform tubes distribution. The results show that

... Show More
View Publication
Scopus (11)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Sat Dec 28 2024
Journal Name
Journal Of Baghdad College Of Dentistry
The role of 3-dimensional multi-detector computed tomography in the diagnosis of Eagle’s syndrome and correlation with severe headache and migraine (Iraqi study)
...Show More Authors

Background: The styloid process is a cylindrical bone (protrusion). It situated above the common carotid artery between the external and internal branches immediately proximal to the internal jugular vein and facial nerves. The styloid process varies in length also it may be absent as well as elongated. Classically, an elongated styloid process and calcified of stylohyoid ligament causes Eagle’s syndrome. The aim of this study was to examine the styloid process using 3 dimensional multi-detector computed tomography (3D-MDCT) to detect the presence of Eagle’s syndrome that causes severe headache and migraine. Materials and methods: One hundred patients with severe headache and migraine were exposed to 3D- multi-detector CT with special

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
SDN-RA: An Optimized Reschedule Algorithm of SDN Load Balancer for Data Center Networks Based on QoS
...Show More Authors
Abstract<p>With the development of cloud computing during the latest years, data center networks have become a great topic in both industrial and academic societies. Nevertheless, traditional methods based on manual and hardware devices are burdensome, expensive, and cannot completely utilize the ability of physical network infrastructure. Thus, Software-Defined Networking (SDN) has been hyped as one of the best encouraging solutions for future Internet performance. SDN notable by two features; the separation of control plane from the data plane, and providing the network development by programmable capabilities instead of hardware solutions. Current paper introduces an SDN-based optimized Resch</p> ... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref