Television white spaces (TVWSs) refer to the unused part of the spectrum under the very high frequency (VHF) and ultra-high frequency (UHF) bands. TVWS are frequencies under licenced primary users (PUs) that are not being used and are available for secondary users (SUs). There are several ways of implementing TVWS in communications, one of which is the use of TVWS database (TVWSDB). The primary purpose of TVWSDB is to protect PUs from interference with SUs. There are several geolocation databases available for this purpose. However, it is unclear if those databases have the prediction feature that gives TVWSDB the capability of decreasing the number of inquiries from SUs. With this in mind, the authors present a reinforcement learning-based TVWSDB. Reinforcement learning (RL) is a machine learning technique that focuses on what has been done based on mapping situations to actions to obtain the highest reward. The learning process was conducted by trying out the actions to gain the reward instead of being told what to do. The actions may directly affect the rewards and future rewards. Based on the results, this algorithm effectively searched the most optimal channel for the SUs in query with the minimum search duration. This paper presents the advantage of using a machine learning approach in TVWSDB with an accurate and faster-searching capability for the available TVWS channels intended for SUs.
The histological structure of Pycnonotus leucotis was investigated to fill the dearth of information on the histology of mid-brain from available literature and help understand its brain. The brain is wide and short and its length 1.5 cm, and it consists of three regions. The middle region is the mesencephalon. The mesencephalon was divided into optic tectum and tegmentum. The optic tectum consists of six main layers, while the tegmentum contains nuclei of cranial nerves.
In the last few years, the literature conferred a great interest in studying the feasibility of using memristive devices for computing. Memristive devices are important in structure, dynamics, as well as functionalities of artificial neural networks (ANNs) because of their resemblance to biological learning in synapses and neurons regarding switching characteristics of their resistance. Memristive architecture consists of a number of metastable switches (MSSs). Although the literature covered a variety of memristive applications for general purpose computations, the effect of low or high conductance of each MSS was unclear. This paper focuses on finding a potential criterion to calculate the conductance of each MMS rather t
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThe COVID-19 pandemic has profoundly affected the healthcare sector and the productivity of medical staff and doctors. This study employs machine learning to analyze the post-COVID-19 impact on the productivity of medical staff and doctors across various specialties. A cross-sectional study was conducted on 960 participants from different specialties between June 1, 2022, and April 5, 2023. The study collected demographic data, including age, gender, and socioeconomic status, as well as information on participants' sleeping habits and any COVID-19 complications they experienced. The findings indicate a significant decline in the productivity of medical staff and doctors, with an average reduction of 23% during the post-COVID-19 period. T
... Show MoreWatermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreThis paper presents a newly developed method with new algorithms to find the numerical solution of nth-order state-space equations (SSE) of linear continuous-time control system by using block method. The algorithms have been written in Matlab language. The state-space equation is the modern representation to the analysis of continuous-time system. It was treated numerically to the single-input-single-output (SISO) systems as well as multiple-input-multiple-output (MIMO) systems by using fourth-order-six-steps block method. We show that it is possible to find the output values of the state-space method using block method. Comparison between the numerical and exact results has been given for some numerical examples for solving different type
... Show MoreThe primary components of successful engineering projects are time, cost, and quality. The use of the ring footing ensures the presence of these elements. This investigation aims to find the optimum number of geogrid reinforcement layers under ring footing subjected to inclined loading. For this purpose, experimental models were used. The parameters were studied to find the optimum geogrid layers number, including the optimum geogrid layers spacing and the optimum geogrid layers number. The optimum geogrid layers spacing value is 0.5B. And as the load inclination angle increased, the tilting and the tilting improvement percent for the load inclination angles (5°,10°,15°) are (40%,28%, and 5%) respectively. The reduction percent o
... Show MoreThe primary components of successful engineering projects are time, cost, and quality. The use of the ring footing ensures the presence of these elements. This investigation aims to find the optimum number of geogrid reinforcement layers under ring footing subjected to inclined loading. For this purpose, experimental models were used. The parameters were studied to find the optimum geogrid layers number, including the optimum geogrid layers spacing and the optimum geogrid layers number. The optimum geogrid layers spacing value is 0.5B. And as the load inclination angle increased, the tilting and the tilting improvement percent for the load inclination angles (5°,10°,15°) are (40%,28%, and 5%) respectively. The reduction percent of the
... Show MoreInternal curing is a method that has been advised to decrease the primary age cracking, mainly of concrete mixes using low (water to cementitious materials - w/cm) ratios corresponding to the self-compacting concrete-(SCC). This research aims to study the effect of the internal curing using saturated lightweight aggregate- (LWA) on the steel reinforcing corrosion in SCC. In this research, crushed bricks or thermostone were partially replaced by (20%) by the weight of sand and volumetrically measured. The results showed that the steel reinforcement of internally cured concrete showed a slight increase in corrosion up to 300 days of exposure to the saline solution (containing 3.5% NaCl). The ability of using the crushed bricks or thermostone
... Show More