In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper's CSI at the BS.
priorities of materials research due to their promising properties, especially in the field of thermoelectricity. The efficiency or performance of thermoelectric devices is expressed in terms of the thermoelectric figure-of-merit (ZT) – a standard indicator of a material’s thermoelectric properties for use in cooling systems. The evaluation of ZT is principally determined by the thermoelectric characteristics of the nanomaterials. In this paper, a set of investigative computations was performed to study the thermoelectric properties of monolayer TMDCs according to the semiclassical treatment of the Boltzmann transport equation. It was confirmed that the thermoelectric properties of 2D materials can be greatly improved compared with thei
... Show MoreIn this work preparation of antireflection coating with single layer of MgO using pulsed laser deposition (PLD) method which deposit on glass substrate with different thicknesses (90 and 100) nm annealed at temperature 500 K was done.
The optical and structural properties (X-ray diffraction) have been determined. The optical reflectance was computed with the aid of MATLAB over the visible and near infrared region. Results shows that the best result obtained for optical performance of AR'Cs at 700 shots with thickness 90 nm nanostructure single layer AR'Cs and low reflection at wavelength 550 nm.
Arrested precipitation methode used to synthesize CuInSe2 (CIS) nanocrystals were added to a hot solvent with organic capping ligands to control nanocrystal formation and growth. CIS thin films deposited onto Soda-Lima Glass (SLG) substrate by spray-coat, then selenized in Ar-atmosphere to form CIS thin films. PVs were made with power conversion efficiencies of 0.631% as-deposited and 0.846% after selenization, for Mo coated, under AM 1.5 illuminations. (XRD) and (EDX) it is evident that CIS have chalcopyrite structure as the major phase with a preferred orientation along (112) direction and Cu:In:Se nanocrystals is nearly 1:1:2 atomic ratio.
The purpose of this paper is to preparing preventive exercises supported by collagen supplements and vitamin D for handball players, and identify the effect of preventive physical exercises supported by collagen supplements and vitamin D on some physical and skill abilities of handball players. The researchers used the experimental method and designed two groups, one experimental and the other control, with both pre- and post-tests, to suit the nature of the research. The research community was selected from handball players (specialized school players), numbering (14), and they were divided into two groups, each group numbering (7) players. One of the most important results reached by the researcher is that: The exercises prepared by the r
... Show MoreThe current research aims to determine the intellectual security and the psychological resilience of Secondary school students and how these two variables are related to each other. The study also seeks the extent to which psychological resilience contributes to intellectual security
The research sample consisted of (420) students from the Secondary stage in the Directorate of Education of Baghdad / Rusafa III. Two scales were administered to the participants to collect the needed data. As for the analysis of data, Pearson correlation coefficient, T-test, and the Regression analysis were employed, the results revealed:
- The members of the sample have an intellectual Security.
- The members of the sample have
Is to obtain competitive advantage legitimate objective pursued by all organizations to achieve, because they live today in environments of rapid change and dynamic in order to meet the demands of the customer changing as well as intense competition between the organizations, which requires them to get the location of competitive markets in order to do this will remain to do the building and strengthening competitive advantage to be able to achieve, but that this feature is not easy and is not only through the identification and use of a successful strategy for a competitive standard and then manage it successfully. Hence the research problem of determining the sources of differentiation strategy and its impact on the dimensions of compe
... Show MoreThe development of information systems in recent years has contributed to various methods of gathering information to evaluate IS performance. The most common approach used to collect information is called the survey system. This method, however, suffers one major drawback. The decision makers consume considerable time to transform data from survey sheets to analytical programs. As such, this paper proposes a method called ‘survey algorithm based on R programming language’ or SABR, for data transformation from the survey sheets inside R environments by treating the arrangement of data as a relational format. R and Relational data format provide excellent opportunity to manage and analyse the accumulated data. Moreover, a survey syste
... Show MoreData scarcity is a major challenge when training deep learning (DL) models. DL demands a large amount of data to achieve exceptional performance. Unfortunately, many applications have small or inadequate data to train DL frameworks. Usually, manual labeling is needed to provide labeled data, which typically involves human annotators with a vast background of knowledge. This annotation process is costly, time-consuming, and error-prone. Usually, every DL framework is fed by a significant amount of labeled data to automatically learn representations. Ultimately, a larger amount of data would generate a better DL model and its performance is also application dependent. This issue is the main barrier for
The agent-based modeling is currently utilized extensively to analyze complex systems. It supported such growth, because it was able to convey distinct levels of interaction in a complex detailed environment. Meanwhile, agent-based models incline to be progressively complex. Thus, powerful modeling and simulation techniques are needed to address this rise in complexity. In recent years, a number of platforms for developing agent-based models have been developed. Actually, in most of the agents, often discrete representation of the environment, and one level of interaction are presented, where two or three are regarded hardly in various agent-based models. The key issue is that modellers work in these areas is not assisted by simulation plat
... Show More