In this paper, we characterize the percolation condition for a continuum secondary cognitive radio network under the SINR model. We show that the well-established condition for continuum percolation does not hold true in the SINR regime. Thus, we find the condition under which a cognitive radio network percolates. We argue that due to the SINR requirements of the secondaries along with the interference tolerance of the primaries, not all the deployed secondary nodes necessarily contribute towards the percolation process- even though they might participate in the communication process. We model the invisibility of such nodes using the concept of Poisson thinning, both in the presence and absence of primaries. Invisibility occurs due to nodes that i) cannot decode transmissions except from their nearest neighbors, ii) are always interfered, and iii) belong to isolated components. We find the thinning probability in terms of primary and secondary densities, communication radii, and interference cancellation coefficient. Further, we show how the effective coverage radius shrinks which also adds to the thinning. Theoretical findings are validated through simulations.
Cognitive radio is observed as a new approach, which could be cope with the spectral limitations. This approach is designed to detect whether a particular segment of the radio spectrum is currently in use and to jump into the temporarily unused spectrum rapidly without interfering with the transmissions of other users. CR is the promising radio technology which aims to detect and utilize the temporally unused spectrum bands by sensing its radio environment in order to improve spectrum utilization. To enhance the sensing performance, cooperative spectrum sensing has been proposed. However, when the number of cognitive user tends to be very large, the bandwidth for reporting sensing results to the common receiver will be very huge. In this pa
... Show MoreEncouraging children towards the cognitive motivation through the discovery and knowledge of the environment around them is essential. Thus, during the two researchers’ supervision of the practical lessons that involved the female students’ application of their experience in the Applied Kindergarten Laboratory, it has been noticed that there was a difference in the cognitive motivation of kindergarten children. In order to reinforce the research problem, the two researchers sent an open questionnaire to a sample of randomly selected kindergarten teachers from Al-Karkh and Al-Rasafa sides. The responses collected accentuated the researchers’ sense of the existing problem. To achieve the aim of the study represented by examining the
... Show MoreStudies and scientific research conducted in the field of communication have shown that broadcasting has a clear impact on the ideas, attitudes and behavior of the masses if it is better used in making the media message studied.
The role of this means is not only to present opinions and ideas, but also to influence trends by supporting or changing them. This is of course a matter for the nature of the content in terms of its formulation and the way it is prepared and presented. The power and appeal of a radio message is not complete by simply creating content without creating a distinctive design; and to what extent this content depends on the logic and psychology of persuasion.
The conviction of the cont
... Show MoreArray antennas have an interesting role in the radio astronomy field. The array antennas allow astronomers to obtain high-resolution signals with high sensitivity to weak signals. This paper estimates the meteors' positions entering the Earth's atmosphere and develops a simulation for array antenna radar to analyze the meteor's echoes. The GNU radio software was used to process the echoes, which is a free open-source software development toolkit that provides signal processing blocks to implement in radio projects. Then, the simulation determines the azimuth and elevation of the meteors. An improved Multiple Signal Classification (MUSIC) algorithm has been suggested to analyze these echoes. The detected power of each meteor echo has
... Show MoreThe need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At th
... Show MoreIdentification of complex communities in biological networks is a critical and ongoing challenge since lots of network-related problems correspond to the subgraph isomorphism problem known in the literature as NP-hard. Several optimization algorithms have been dedicated and applied to solve this problem. The main challenge regarding the application of optimization algorithms, specifically to handle large-scale complex networks, is their relatively long execution time. Thus, this paper proposes a parallel extension of the PSO algorithm to detect communities in complex biological networks. The main contribution of this study is summarized in three- fold; Firstly, a modified PSO algorithm with a local search operator is proposed
... Show MoreThe aim of this paper is to approximate multidimensional functions by using the type of Feedforward neural networks (FFNNs) which is called Greedy radial basis function neural networks (GRBFNNs). Also, we introduce a modification to the greedy algorithm which is used to train the greedy radial basis function neural networks. An error bound are introduced in Sobolev space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result is published in [16]).