In this paper, we use concepts and results from percolation theory to investigate and characterize the effects of multi-channels on the connectivity of Dynamic Spectrum Access networks. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from-a phenomenon which we define as channel abundance. To cope with the existence of multi-channels, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocol, it becomes difficult for two nodes to agree on a common channel, thereby potentially remaining invisible to each other. We model this invisibility as a Poisson thinning process and show that invisibility is even more pronounced with channel abundance. Following the disk graph model, we define and characterize connectivity of the secondary network in terms of the available number of channels, deployment densities, number of transceivers per node, and communication range. When primary users are absent, we derive the critical number of channels which maintains super-criticality of the secondary network. When primary users are present, we characterize and analyze the connectivity for all the regions: channel abundance, optimal, and channel deprivation. Our results can be used to decide on the goodness of any channel rendezvous algorithm by computing the expected resultant connectivity.
The graphic privacy feature is one of the most important specifications for the existence of any type of design achievements alike, which is one of the graphic products with its multiple data, and from here the current research investigates the graphic privacy of vector graphics design with all its technical descriptions and concepts associated with it and the possibility of achieving it to the best that it should be from Where its formal structure in children's publications, where the structural structure of the current research came from the first chapter, which contained the research problem, which came according to the following question: What is the graphic privacy in the design of vector graphics in children's publ
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreNew developments imposed different patterns of interactions between major international powers and Iran during 2018, ranging to varying degrees between cooperation and tension, the most important of which is the new measures taken by the United States to withdraw from the nuclear agreement and impose new US sanctions on Iran, which in turn insisted on not responding to pressure to which they are exposed to make changes in their policies and to negotiate again about the main contentious files, especially the nuclear program and ballistic missiles, and the roles they play for crisis countries, especially supporting some armed organizations in Syria, Lebanon, Iraq and Yemen. These differences have put the international forces before difficult
... Show MoreDBN Rashid, International Journal of Innovation, Creativity and Change, 2020
Background: The Epstein-Barr virus (EBV) relates to the torch virus family and is believed to have a substantial impact on mortality and perinatal events, as shown by epidemiological and viral studies. Moreover, there have been documented cases of EBV transmission occurring via the placenta. Nevertheless, the specific location of the EBV infection inside the placenta remains uncertain. Methods: The genomic sequences connected to the latent EBV gene and the levels of lytic EBV gene expression in placental chorionic villous cells are examined in this work. A total of 86 placentas from patients who had miscarriage and 54 placentas from individuals who had successful births were obtained for analysis. Results: The research employed QPCR to dete
... Show MoreBackground: Epilepsy is a common neurological disorder of incidence rate 1-2%. Genetic, congenital, developmental, tumors, head trauma and central nervous system infections maybe the cause of epilepsy. This study aimed to determine the prevalence of stomatitis, xerostomia and taste disorder among patients taking carbamazepine or sodium valproate and to make salivary analysis for IgA, cystatin c and salivary flow rate. Material and method:This study performed in al- Yarmuk teaching hospital in Baghdad, Samples consist of (70) epileptics half of them treated with carbamazepine and other half treated with sodium valproate, and (18) healthy control group of both genders and with different ages to detect the prevalence of oral manifestations, s
... Show MoreBackground: Metal ions can be released from metallic orthodontic appliances due to corrosion in the oral cavity; prophylactic mouthwashes may have an effect on ion release from orthodontic wires. Materials and Methods: Thirty six orthodontic sets of half maxillary fixed appliance with 2 types of arch wires SS and NiTi(Morelli) were constructed and immersed in 2 types of mouthwashes; Claradone (non-fluoridated) and Silver Care (fluoridated) for 28 days at 37°C, then the released Ni and Cr ionswere measured using atomic absorption spectrophotometer and compared statistically. Results: Ni ion release was higher from NiTi wire group than SS wire group for both mouthwashes and also was higher for Silver Care group than for Claradone group.
... Show More