In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper's CSI at the BS.
The world went through turmoil before the sixth century AD, and human societies were in conflict and rivalry, each strong state is a weak state-dependent, but the dominant societies made the slave societies to them .. And thus made many societies or civilizations system of classes, and differentiation between members of one community, Weakened its strength and go alone. As the Islamic society in the present weak and weak and falling to the lowest levels of civilizational underdevelopment in the organization of society and social security contrary to what it was Islamic civilization, because of our distance from the heavenly instructions, and this prompted many to walk behind Western ideas aimed at the demolition of Islamic civilization,
... Show MorePraise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
We see human societies differ from one society to another in organizing social life, and each according to the foundations and rules prepared by the main thing in the welfare and prosperity.
That is why we see eastern societies differ from western societies in many patterns and various ways of reaching that sophistication, until Islam came and gave the proper model in raising society at that time to the best and highest social levels, because it is based on heavenly rules and foundations and not status as in previous civilizations.
And when the Islamic community has
Vehicular ad hoc network (VANET) is a distinctive form of Mobile Ad hoc Network (MANET) that has attracted increasing research attention recently. The purpose of this study is to comprehensively investigate the elements constituting a VANET system and to address several challenges that have to be overcome to enable a reliable wireless communications within a vehicular environment. Furthermore, the study undertakes a survey of the taxonomy of existing VANET routing protocols, with particular emphasis on the strengths and limitations of these protocols in order to help solve VANET routing issues. Moreover, as mobile users demand constant network access regardless of their location, this study seeks to evaluate various mobility models for vehi
... Show MoreSystems on Chips (SoCs) architecture complexity is result of integrating a large numbers of cores in a single chip. The approaches should address the systems particular challenges such as reliability, performance, and power constraints. Monitoring became a necessary part for testing, debugging and performance evaluations of SoCs at run time, as On-chip monitoring is employed to provide environmental information, such as temperature, voltage, and error data. Real-time system validation is done by exploiting the monitoring to determine the proper operation of a system within the designed parameters. The paper explains the common monitoring operations in SoCs, showing the functionality of thermal, voltage and soft error monitors. The different
... Show MoreBrachycerous Dipteran species on alfalfa plant Medicago sativa surveyed in several regions of Iraq from March to November 2012. The study was registered 14 species belonging to nine genera and four families. The results showed that Limnophra quaterna, Atherigona laevigata and Atherigona theodori as new records to Iraq and new pests of alfalfa.
Background: The main objective was to compare the outcome of single layer interrupted extra-mucosal sutures with that of double layer suturing in the closure of colostomies.
Subjects and Methods: Sixty-seven patients with closure colostomy were assigned in a prospective randomized fashion into either single layer extra-mucosal anastomosis (Group A) or double layer anastomosis (Group B). Primary outcome measures included mean time taken for anastomosis, immediate postoperative complications, and mean duration of hospital stay. Secondary outcome measures assessed the postoperative return of bowel function, and the overall mean cost. Chi-square test and student t-test did the statistical analysis..
Resu
... Show MoreEnergy is one of the components of the national security of countries and is of particular importance to the industrialized countries, including Germany. Energy policy includes many areas and has an impact on various sectors such as the environment, climate, agriculture and others. During the past few years, Germany has witnessed many transformations, the most important of which is the energy transition towards renewable energy, and it was strengthened in the strategy that was It was developed in 2010, which aims to achieve a long-term energy transformation, and sales of the German energy technology sector have evolved from 2010 to 2020, and this issue is related on the other hand to the concept of energy security and because of its strateg
... Show MoreLocalization is an essential demand in wireless sensor networks (WSNs). It relies on several types of measurements. This paper focuses on positioning in 3-D space using time-of-arrival- (TOA-) based distance measurements between the target node and a number of anchor nodes. Central localization is assumed and either RF, acoustic or UWB signals are used for distance measurements. This problem is treated by using iterative gradient descent (GD), and an iterative GD-based algorithm for localization of moving sensors in a WSN has been proposed. To localize a node in 3-D space, at least four anchors are needed. In this work, however, five anchors are used to get better accuracy. In GD localization of a moving sensor, the algo
... Show More