In cognitive radio networks, there are two important probabilities; the first probability is important to primary users called probability of detection as it indicates their protection level from secondary users, and the second probability is important to the secondary users called probability of false alarm which is used for determining their using of unoccupied channel. Cooperation sensing can improve the probabilities of detection and false alarm. A new approach of determine optimal value for these probabilities, is supposed and considered to face multi secondary users through discovering an optimal threshold value for each unique detection curve then jointly find the optimal thresholds. To get the aggregated throughput over transmission, cognitive users' throughput is considered in terms optimal threshold value in order to opportunistically utilize the unused band for transmission. Simulation results proved that it can maximize the aggregated opportunistic throughput subject to constraints on the aggregated interference for primary user as well as individual constraints on secondary users.
As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreIn this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.
In this paper we present a method to analyze five types with fifteen wavelet families for eighteen different EMG signals. A comparison study is also given to show performance of various families after modifying the results with back propagation Neural Network. This is actually will help the researchers with the first step of EMG analysis. Huge sets of results (more than 100 sets) are proposed and then classified to be discussed and reach the final.
This study aims to test ceramic waste's capacity to remove nickel from aqueous solutions through adsorption. Ceramic wastes were collected from the Refractories Manufacturing Plant in Ramadi. Through a series of lab tests, the reaction time (5, 10, 15, 20, 25, 30, 35, 40, 45, and 50 minutes, and Ni concentrations (20, 40, 60, and 80) were tested using ceramic wastes with a solid to liquid ratio of 2g/30ml. At a temperature of 30ºC, the pH, total dissolved solids (TDS), and electrical conductivity (EC) were all measured. The equilibrium time was set at 30 min. Thereafter, the sorption (%) somewhat increased positively with the Ni concentration. Freundlich's equation showed that the adsorption intensity is 1.1827 and the Freundlich c
... Show More