In this paper, we use concepts and results from percolation theory to investigate and characterize the effects of multi-channels on the connectivity of Dynamic Spectrum Access networks. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from-a phenomenon which we define as channel abundance. To cope with the existence of multi-channels, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocol, it becomes difficult for two nodes to agree on a common channel, thereby potentially remaining invisible to each other. We model this invisibility as a Poisson thinning process and show that invisibility is even more pronounced with channel abundance. Following the disk graph model, we define and characterize connectivity of the secondary network in terms of the available number of channels, deployment densities, number of transceivers per node, and communication range. When primary users are absent, we derive the critical number of channels which maintains super-criticality of the secondary network. When primary users are present, we characterize and analyze the connectivity for all the regions: channel abundance, optimal, and channel deprivation. Our results can be used to decide on the goodness of any channel rendezvous algorithm by computing the expected resultant connectivity.
One of the most powerful tools for any stellar dynamics is the N-body simulation. In an N-body simulation the motion of N particles is followed under their mutual gravitational attraction. In this paper the gravitational N-body simulation is described to investigate Newtonian and non- Newtonian (modified Newtonian dynamics) interaction between the stars of spiral galaxies. It is shown that standard Newtonian interaction requires dark matter to produce the flat rotational curves of the systems under consideration, while modified Newtonian dynamics (MOND) theorem provides a flat rotational curve and gives a good agreement with the observed rotation cu |
The useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables
Islam was keen to get every man and woman a share of those benefits and wanted to marry and urged him. In order to unite efforts and articulates the arrow and clarifies the goal and I have a share in building a sober Islamic society, for all this and other research title is ((modern or planting and its impact on marital happiness)).
Facts and information contained showing in axes Find Egyptian Ottoman relations
(1863-1879), has gone through stages varying between tides, has witnessed the Khedive
Ismail three sultans Ottomans were Abdul Aziz Murad V, Abdul Hamid II, and since the
Khedive Ismail to judge sought to expand independence Egypt access to many privileges of
the sovereign on Egypt Ottoman Empire, in order to reach the country to independence, has
been chosen by the payment of money and gifts to gain independence, without resorting to
arms, and from this point of Khedive make a lot of money to get the privileges, the state of
the Ottoman were not to issue Farmans but against the huge amounts of money, and as a
result of that policy got
To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show MoreThe biosorption of Pb (II), Cd (II), and Hg (II) from simulated aqueous solutions using baker’s yeast biomass was investigated. Batch type experiments were carried out to find the equilibrium isotherm data for each component (single, binary, and ternary), and the adsorption rate constants. Kinetics pseudo-first and second order rate models applied to the adsorption data to estimate the rate constant for each solute, the results showed that the Cd (II), Pb (II), and Hg (II) uptake process followed the pseudo-second order rate model with (R2) 0.963, 0.979, and 0.960 respectively. The equilibrium isotherm data were fitted with five theoretical models. Langmuir model provides the best fitting for the experimental results with (R2) 0.992, 0
... Show MoreIn this study, thermal characteristics of a two-phase closed heat pipe were investigated experimentally and theoretically. A two-phase closed heat pipe (copper container, Fluorocarbon FC-72 (C6F14) working fluid) was fabricated to examine its performance under the effect of input heat flux range of 250–1253 W/m2 , 70% fill charge ratio and various tilt angles. The temperature distribution along the heat pipe, input heat to evaporator section, and output heat from condenser were monitored. A comprehensive mathematical model was developed to investigate the steadystate heat transfer performance of a two-phase closed heat pipe. A steady state analytical model, is presented to determine important parameters on the design of two-phase close
... Show MoreNi-Co-Mn-Mg ferrite nanoparticles with the formula (Ni,Co)xMn0.25-xMg0.75Fe2O4 were synthesized in this work by employing the sol-gel auto-combustion process, with nitrates used as the cations source and citric acid (C6H8O7) as the combustion agent. X-ray diffraction (XRD), field emission scanning electron microscopy (FE-SEM), energy dispersive X-ray (EDX), and a vibrating sample magnetometer (VSM) were used to characterize the structural, morphological, and magnetic properties of ferrite powders. The XRD measurements showed crystallite sizes ranging between 24 - 28 nm. The FE-SEM images show the presence of agglomeration as well as a non-homogeneous distribution of the samples. On the other hand, the stoichiometry of the react
... Show MoreNew complexes of M(II) with mixed ligand of 5-Chlorosalicylic acid (CSA) C7H5ClO3 as primary ligand and L- Valine (L-Val) C5H11NO2 as a secondary ligand were prepared and characterized by elemental analysis (C.H.N), UV., FT-IR, magnetic susceptibility, μeff (B.M) as well as the conductivity measurements (Λm ). In the complexes, the 5-chlorosalicylic acid is bidentate in all complexes coordinating through –OH- and –COO- groups; also L-Valine behaves as a bidentate ligand in all complexes through –NH2 and –COO- groups. These five mixed ligand complexes formulated as Na3[M(CSA)2(L-Val)]. The proposed molecular structure for all complexes is octahedral geometries. The synthesis complexes were tested in vitro for against four bacteria
... Show More