6G Wireless Communications Networks: A Comprehensive Survey
...Show More Authors
The continuous technical development in the means of communication and information technologies has led to an increase in competition in the provision of service and product on the part of the organizations, as this competition does not know silence and stability on specific methods, but rather it is a world that is constantly moving and renewed in approaches, methods and approaches, and the focus of attention of integrated marketing communications practitioners are Customers, for them, organizations sell their goods, products, services, and ideas, and with them, they become stronger in competition.
This scientific study aimed to identify the trends of the initiators towards the integrated marketing communications of (the Emirates Tel
In this paper, a Modified Weighted Low Energy Adaptive Clustering Hierarchy (MW-LEACH) protocol is implemented to improve the Quality of Service (QoS) in Wireless Sensor Network (WSN) with mobile sink node. The Quality of Service is measured in terms of Throughput Ratio (TR), Packet Loss Ratio (PLR) and Energy Consumption (EC). The protocol is implemented based on Python simulation. Simulation Results showed that the proposed protocol provides better Quality of Service in comparison with Weighted Low Energy Cluster Hierarchy (W-LEACH) protocol by 63%.
Visible Light Communication (VLC) has emerged as a powerful technique for wireless communication systems. Providing high data rate and increasing capacity are the major problems in VLC. Recent evidence suggests that Multiple Input Multiple Output (MIMO) technique can offers improved data rates and increased link range. This paper describes the design and implementation of visible light communication system in indoor environment exploring the benefits of MIMO. The specific objective of this research was to implement a 4× 4 Multiple Input (LEDs) Multiple Output (photodetectors)-VLC communication system, where a 16 white power LEDs in four arrays are setting up at transmitter and four RX modules are setting up at receiver side without the nee
... Show MoreObjectives: Determine the age and gender distribution of children who experience diabetes mellitus (DM) under
the age of 15 years and the presence of some associated factors that might be a predisposing factor for the
disease including obesity.
Methodology: A cross-sectional study was conducted at diabetic clinic in Children Welfare Teaching Hospital
in Baghdad City during 2006. The study sample included diabetic children less than 15 years of age. Data were
taken from the patients' record and by direct interview with the patients' parents. Information included
demographic data, as well as past history of the patient and his/her family relative to diabetes and other immune
diseases.
Results: Data analysis showed t
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show More