The industrial factory is one of the challenging environments for future wireless communication systems, where the goal is to produce products with low cost in short time. This high level of network performance is achieved by distributing massive MIMO that provides indoor networks with joint beamforming that enhances 5G network capacity and user experience as well. Judging from the importance of this topic, this study introduces a new optimization problem concerning the investigation of multi-beam antenna (MBA) coverage possibilities in 5G network for indoor environments, named Base-station Beams Distribution Problem (BBDP). This problem has an extensive number of parameters and constrains including user’s location, required data rate and number of antenna elements. Thus, BBDP can be considered as NP-hard problem, where complexity increases exponentially as its dimension increases. Therefore, it requires a special computing method that can handle it in a reasonable amount of time. In this study, several differential evolution (DE) variants have been suggested to solve the BBDP problem. The results show that among all DE variants the self-adaptive DE (jDE) can find feasible solutions and outperform the classical ones in all BBDP scenarios with coverage rate of 85% and beam diameter of 500 m.
In this paper, a hybrid image compression technique is introduced that integrates discrete wavelet transform (DWT) and linear polynomial coding. In addition, the proposed technique improved the midtread quantizer scheme once by utilizing the block based and the selected factor value. The compression system performance showed the superiority in quality and compression ratio compared to traditional polynomial coding techniques.
Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreThe right of the patient to know the medical risks surrounding the medical intervention is one of the most prominent rights based on the principle of "physical safety", which has undergone several stages of development until it reached the development of the patient's independence in making medical decision without relying on the doctor, The patient's prior informed consent is informed of his / her medical condition. We will study this development in accordance with the French March 4, 2002 legislation on the rights of patients in the health system, whether it was earlier and later. We will highlight the development of the patient's right to "know the medical risks surrounding medical intervention" The legislation and its comparison with th
... Show MoreCrow Search Algorithm (CSA) can be defined as one of the new swarm intelligence algorithms that has been developed lately, simulating the behavior of a crow in a storage place and the retrieval of the additional food when required. In the theory of the optimization, a crow represents a searcher, the surrounding environment represents the search space, and the random storage of food location represents a feasible solution. Amongst all the food locations, the one where the maximum amount of the food is stored is considered as the global optimum solution, and objective function represents the food amount. Through the simulation of crows’ intelligent behavior, the CSA attempts to find the optimum solutions to a variety of the proble
... Show MoreThis paper presents an alternative method for developing effective embedded optimized Runge-Kutta (RK) algorithms to solve oscillatory problems numerically. The embedded scheme approach has algebraic orders of 5 and 4. By transforming second-order ordinary differential equations (ODEs) into their first-order counterpart, the suggested approach solves first-order ODEs. The amplification error, phase-lag, and first derivative of the phase-lag are all nil in the embedded pair. The alternative method’s absolute stability is demonstrated. The numerical tests are conducted to demonstrate the effectiveness of the developed approach in comparison to other RK approaches. The alternative approach outperforms the current RK methods
... Show MoreThe aim of the present work was to study the possibility of producing an effective bacteriocin from bacteria naturally exists in the mouth. Streptococcus salivarius KA101 was selected among 120 oral isolates collected from healthy people based on its ability to produce an effective bactericidal bacteriocin. Modified tryptic soy agar with 2% yeast extract and 0.1% calcium carbonate was the best medium for the production of bacteriocin with an activity of 40 AU/ml. Response surface methodology (RSM) based on central composite design (CCD) was employed to build a model in order to evaluate the optimum effective factors for bacteriocin production using four factors: yeast extract, CaCO3, pH and incubation time. Based on t
... Show MoreIn this paper normal self-injective hyperrings are introduced and studied. Some new relations between this concept and essential hyperideal, dense hyperideal, and divisible hyperring are studied.
An -module is called absolutely self neat if whenever is a map from a maximal left ideal of , with kernel in the filter is generated by the set of annihilator left ideals of elements in into , then is extendable to a map from into . The concept is analogous to the absolute self purity, while it properly generalizes quasi injectivity and absolute neatness and retains some of their properties. Certain types of rings are characterized using this concept. For example, a ring is left max-hereditary if and only if the homomorphic image of any absolutely neat -module is absolutely self neat, and is semisimple if and only if all -modules are absolutely self neat.
This paper adapted the neural network for the estimating of the direction of arrival (DOA). It uses an unsupervised adaptive neural network with GHA algorithm to extract the principal components that in turn, are used by Capon method to estimate the DOA, where by the PCA neural network we take signal subspace only and use it in Capon (i.e. we will ignore the noise subspace, and take the signal subspace only).