In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper's CSI at the BS.
Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.
Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreBackground: Bone regeneration in dehiscence and fenestration defect can be improved with the use of platelet rich fibrin (PRF) that provides a scaffold for new bone regeneration. This study was conducted to assess the effectiveness of PRF as a graft material and membrane in dehiscence and fenestration defects. Materials and Methods: This prospective clinical study included patients who received dental implants that demonstrated peri-implant defects which were augmented using Leukocyte- PRF (L-PRF) or Advanced-PRF (A-PRF). Twenty four weeks postoperatively the defect resolution and the density of regenerated bone were assessed by CBCT and re-entry surgery. The assessment also included measurement of primary and secondary implant stability
... Show MoreThe present research aimed to study the polymorphisms of the chicken insulin-like growth factor 2 (IGF2) in two commercial broiler breeds (Cobb 500 and Hubbard F-15). In total, 300 avian blood samples were obtained. The genomic DNA was isolated using a fast salt-extraction technique. Moreover, polymerase chain reaction (PCR) was used to amplify 1146 bp fragments of the gene. The amplified fragments were subjected to restriction enzyme digestion using the HinfI endonuclease enzyme, and the digested products were separated on a 2% agarose gel. The findings indicated that there were two alleles, T and C, for the target locus, with frequencies of 73.3% and 26.7%, respectively. Three distinct genotype variations, TT, TC, and CC, were found, with
... Show MoreIranian stories have been one of the most important aspects of Iranian society's culture and have reflected us as a mirror of all its cultural, societal and political dimensions.Among the important elements of the story can be the creation of space and the movement and the creation of characters and conflict and content and the angle of vision and landscape, language and subject. Studying the elements of the story leads to more understanding and determining the strength and skill of the author by studying the elements of his story. The story of Rustom and Suhrab is also one of the many stories in which the elements of the story are often noticed and show the skill of the great professor Al-Fardousi to benefit from these eleme
... Show MorePregnancy pose an additional burden on the body of the mother so as to meet their needs and the needs of the fetus and the body's need to iron increases excessively during pregnancy and iron is an essential element for the formation of hemoglobin blood Either hemoglobin is the key ingredient for red blood cells which carries oxygen to parts of the body, alas, most of the pregnant women begin their pregnancy inadequate stocks of iron in their bodies, which does not cover their need and requirement of the fetus, especially in the second and third trimesters of pregnancy When you reach the mother to the period in which they did not have the adequate amount of iron to produce hemoglobin become the mother was anemic So emerged the problem of
... Show MoreThe implementation of the concept of project scheduling in the organizations generally requires a set of procedures and requirements, So, most important of all is the understanding and knowledge of the tools and techniques which are called the methods of scheduling projects. Consequently, the projects of the municipality administration in the holy governorate of Karbala suffer from the problem of delaying their projects and chaos in the ways of implementation. To provide assistance to this directorate and to demonstrate how to schedule projects using one of the advanced scientific methods that proved their ability to schedule any project and its potential to accelerate the time of completion, as well as ease of use and effectiven
... Show MoreDiabetic kidney disease is an illness of the glomerulus that interferes with the glomerular filtration barrier (GFB), which is worked to enable kidney to selective purification of water and solutes in addition to limiting the movement of large macromolecules such as albumin. In the glomerular endothelium, mesangial cells, foot cells, and the brush border of the proximal tubules, ACE-2 is expressed and that the kidneys represent the highest-expressing region of this enzyme. Thus, the current study aimed to evaluate ACE-2 level in this case compared to healthy condition. The study Conducted with 120 male and female ranging in age (30-65) years old. Ninety patients with type 2 diabetes subdivided into three groups on the basis of A
... Show MoreIn the present research we the study the deposition of radioactive elements naturally and particularly radioactive radon gas in parts of the body of organisms which are of direct relevance to human life in the city of Baghdad as the samples which were collected from the bones and skin of some kinds of birds and chicken based on the principle that radioactive elements are concentrated always on the bones. We use of this as the exercise detector impact nuclear (CR-39), using the technology Cylindrical diffusion , the results indicated that the largest concentration of radon found in the bone bird Seagull tapered as it was (625 ± 37) Bq.cm-3, and less concentration of radon gas in the chicken bones of Al-kafeel as it was (105 ± 10) Bq.c
... Show More