In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show More
The various properties of the ground and excited electronic states of coumarins 102 using density functional theory (DFT) and time-dependent density functional theory (TDDFT) was calculated by the B3LYP density functional model with 6-31G(d,p) basis set by Gaussian 09 W program. Spectral characteristics of coumarin102 have been probed into by methods of experimental UV-visible, and quantum chemistry. The UV spectrum was measured in methanol. The optimized structures, total energies, electronic states (HOMO- LUMO), energy gap, ionization potentials, electron affinities, chemical potential, global hardness, softness, global electrophilictity, and dipole moment were measured. We find good agreement between experimental data of UV spectrum and
... Show MoreThe goal of our study is to perform detailed multiband surface photometry of the spiral galaxy NGC 4448 and its brightest star-forming regions. The structure and composition of the stellar population in the surface brightness galaxy NGC 4448 was studied using BVR CCD photometry. The observations were obtained on the 1.88 m optical telescope of Kottamia Astronomical Observatory (KAO), Egypt. A two-dimensional decomposition of the galaxy bulge and disk components is carried out. A powerful star forming region is observed near the galactic center. Based on the positions of the various components of the galaxy in two color diagrams. From the observations, the surface brightness profiles, Ellipticity profiles, position angle profiles and colo
... Show MoreAnchusa strigosa - prickly alkanet from Boraginaceae grows in roadsides, and fields of a broad range of habitats from mediterranean woodlands, to steppe vegetation, to true desert. It is commonly known as" him him" or "lisan al thawr". Anchusa can withstand hard weather conditions and hence is widely cultivated. The color of its flowers can range from pure white to deep cobalt blue. Various parts of A. strigosa are used in traditional medicine for treating several diseases or symptoms, such as abdominal pain, bronchitis, cough, and diarrhea. The goal of this study was to examine the cytotoxic effect of the crude extract of A. strigosa roots and leaves and their fractions against various tumor cell lines: adenoc
... Show MoreThe study aimed to evaluating the inhibitory activity of apigenin extracted from Salvia officinalis leaves on the growth of L20B cancer cell in vitro, and through two incubation periods; 48 and 72 hours. Accordingly, eight concentrations (1.56, 3.13, 6.25, 12.5, 25.0, 50.0, 100.0 and 200.0 micromol) of apigenin and similar concentrations of vitamin C and carbon tetrachloride (CCl4) were tested. The apigenin revealed its significant inhibitory potentials against the growth of L20B cell line, especially at the low concentrations (1.56, 3.13 and 6.25 micromol) and at 72 incubation period in comparison with vitamin C and CCl4.
Some maps of the chaotic firefly algorithm were selected to select variables for data on blood diseases and blood vessels obtained from Nasiriyah General Hospital where the data were tested and tracking the distribution of Gamma and it was concluded that a Chebyshevmap method is more efficient than a Sinusoidal map method through mean square error criterion.
KE Sharquie, AA Noaimi, MS Al-Zoubaidi, Journal of Cosmetics, Dermatological Sciences and Applications, 2015 - Cited by 8