A Survey Study and Comparison of Drones Communication Systems
...Show More Authors
A numerical and experimentally investigation for two types of winglets (spiroid and blended), which are used to reduce the induced drag caused by the trailing vortices were presented and discussed in this work. The SOLIDWORK 2016 was used to model a rectangular wing geometry of NACA2415 cross-sectional airfoil with blended and spiroid airfoils (2415 and 0012). The steady, incompressible N.S equations with standard (
This paper presents a minimum delay congestion control in differentiated Service communication networks. The premium and ordinary passage services based fluid flow theory is used to build the suggested structure in high efficient manage. The established system is capable to adeptly manage both the physical network resource limitations and indefinite time delay related to networking system structure.
Background: Restoration of root canal treated teeth with a permanent restoration affect in the success of endodontically treated teeth. This in vitro study was performed to evaluate and compare the fracture strength of endodontically treated teeth restored by using custom made zirconium posts and cores, prefabricated carbon fiber, glass fiber and zirconium ceramic posts. Materials and method: Forty intact human mandibular second premolars were collected for this study and were divided into five groups. Each group contains 8 specimens: Group1: Teeth restored with Carbon Fiber Posts; Group2: Teeth restored with Glass Fiber Posts; Group3: Teeth restored with Zirconium Ceramic prefabricated Posts; Group4: Teeth restored with Zirconium Posts
... Show MoreFundamentals Concept in Metorology an Introductory Survey - ISBNiraq.org
In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show More