In this paper, we characterize the percolation condition for a continuum secondary cognitive radio network under the SINR model. We show that the well-established condition for continuum percolation does not hold true in the SINR regime. Thus, we find the condition under which a cognitive radio network percolates. We argue that due to the SINR requirements of the secondaries along with the interference tolerance of the primaries, not all the deployed secondary nodes necessarily contribute towards the percolation process- even though they might participate in the communication process. We model the invisibility of such nodes using the concept of Poisson thinning, both in the presence and absence of primaries. Invisibility occurs due to nodes that i) cannot decode transmissions except from their nearest neighbors, ii) are always interfered, and iii) belong to isolated components. We find the thinning probability in terms of primary and secondary densities, communication radii, and interference cancellation coefficient. Further, we show how the effective coverage radius shrinks which also adds to the thinning. Theoretical findings are validated through simulations.
The study aims to identify the level of cognitive beliefs, as well as to identify the level of self-organized learning strategies among intermediate school students. The study also aims to identify the differences in the level of self-organized learning strategies among intermediate school students in term of gender, branch (scientific, literary). In order to achieve the research objectives, the researcher designed a scale to measure the cognitive beliefs. As for the scale of self-organized learning strategies, the researcher adopted a scale of (Pintrich et al. 1991), which was translated by (Izzat Abdelhamid, 1999) , For self-organized learning strategies, the sample consisted of (400) students from the research population, whic
... Show MoreThe present study aimed to identify the exact location and its relation to cognitive
method (risk_caution) to university students. The sample consisted of (300) students who
were chosen randomly and equally. The study results indicated that students possess an
internal exact location and they also use risk cognitive method. The study also indicated that
there is a prophesies which is an exact location for others to reach to caution cognitive
method. Depending on these results, the study recommended to benefit from the results of the
study variables and from the measurement of the exact location and method of cognitive
(risk_caution) to identify male and female students and especially by consulting units at
college
This study aimed to measure the innovative thinking and cognitive cessation among university students. The sample consisted of (400) male and female students at al Mustansiriya University for the academic year (2018/2019). The results of the study showed that there are differences in innovative thinking and cognitive inhibition according to the gender variable in favor of males. There is a positive relationship between innovative thinking and cognitive inhibition. In light of these findings, the researcher presented a set of conclusions and recommendations.
At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreThis document provides an examination of research, on combining orthogonal frequency division multiplexing (OFDM) and optical fibers in communication networks. With the increasing need for data speeds and efficient use of bandwidth experts have been exploring the connection between OFDM, valued for its ability to handle multipath interference and optimize spectral usage and optical fiber technology which provides superior data transmission capabilities with low signal loss and strong protection, against electromagnetic disturbances. The review summarizes discoveries from studies examining the pros and cons of using OFDM, in optical communication networks. It discusses obstacles like fiber nonlinearity, chromatic dispersion and the effects o
... Show MoreMultimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were thro
... Show MoreImproved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval
Flying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conduct
... Show More