Preferred Language
Articles
/
shY5jIcBVTCNdQwCdVWk
Power Efficiency Maximization in Cognitive Radio Networks
...Show More Authors

Cognitive radio technology is used to improve spectrum efficiency by having the cognitive radios act as secondary users to access primary frequency bands when they are not currently being used. In general conditions, cognitive secondary users are mobile nodes powered by battery and consuming power is one of the most important problem that facing cognitive networks; therefore, the power consumption is considered as a main constraint. In this paper, we study the performance of cognitive radio networks considering the sensing parameters as well as power constraint. The power constraint is integrated into the objective function named power efficiency which is a combination of the main system parameters of the cognitive network. We prove the existence of optimal combination of parameters such that the power efficiency is maximized. Then we reformulate the objective function to incorporate the throughput. According to different constraints or degree of significance, we may put proper weight to each term so that we could obtain more preferable combination of parameters. Computer simulations have given the optimal solution curve for different weights. We can draw the conclusion that if we put more emphasis on power efficiency, the transmit power is a more critical parameter, however if throughput is more important, the effect of sensing time is significant.

Scopus Crossref
View Publication
Publication Date
Sun Feb 10 2019
Journal Name
Iraqi Journal Of Physics
Thermoelectric power for thermally deposited cadmium telluride films
...Show More Authors

Thermal evaporation method has used for depositing CdTe films
on corning glass slides under vacuum of about 10-5mbar. The
thicknesses of the prepared films are400 and 1000 nm. The prepared
films annealed at 573 K. The structural of CdTe powder and prepared
films investigated. The hopping and thermal energies of as deposited
and annealed CdTe films studied as a function of thickness. A
polycrystalline structure observed for CdTe powder and prepared
films. All prepared films are p-type semiconductor. The hopping
energy decreased as thickness increased, while thermal energy
increased.

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
Solving the Created Equations from Power Function Distribution
...Show More Authors

      In this paper, a new class of ordinary differential equations is designed for some functions such as probability density function, cumulative distribution function, survival function and hazard function of power function distribution, these functions are used of the class under the study. The benefit of our work is that the equations ,which are generated from some probability distributions, are used to model and find  the  solutions  of problems in our lives, and that the solutions of these equations are a solution to these problems, as the solutions of the equations under the study are the closest and the most reliable to reality. The existence and uniqueness of solutions the obtained equations in the current study are dis

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
Solving Fuzzy Differential Equations by Using Power Series
...Show More Authors

In this paper, the series solution is applied to solve third order fuzzy differential equations with a fuzzy initial value. The proposed method applies Taylor expansion in solving the system and the approximate solution of the problem which is calculated in the form of a rapid convergent series; some definitions and theorems are reviewed as a basis in solving fuzzy differential equations. An example is applied to illustrate the proposed technical accuracy. Also, a comparison between the obtained results is made, in addition to the application of the crisp solution, when the-level equals one.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Political Sciences Journal
power and chinese Abilities development after cold war
...Show More Authors

Abstract: This research deals with the developing of power and different abilities (military, security, economy, technology and scientific excellence) The research shows that the excellence of the Chinese economy and its development , had a positive reflection on the other powers and abilities , it means it is a base of development in all fields. The development in power and Chinese military abilities had a clear effect on Chinese strategic creed , and that what the research deals with in some details. The research also deals with developing Chinese nuclear abilities. The research doesn't ignore the security eye that indicates to the protection of the state sovereignty, concentrating on the unity and safety Chinese lands. The res

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
Derivation Power Sums of Even Integer Number Formula
...Show More Authors

This paper included derivative method for the even r power sums of even integer numbers formula to approach high even (r+2) power sums of even integer numbers formula so on we can approach from derivative odd r power sums of even integer numbers formula to high odd (r+2) power sums of even integer numbers formula this derivative excellence have ability to used by computer programming language or any application like Microsoft Office Excel. Also this research discovered the relationship between r power sums of even integer numbers formula and both formulas for same power sums of odd integer numbers formula and for r power sums of all integer numbers formula in another way.

View Publication Preview PDF
Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Secure Location Privacy Transmitting Information on Cellular Networks
...Show More Authors

      As smartphones incorporate location data, there is a growing concern about location  privacy as smartphone technologies advance. Using a remote server, the mobile applications are able to capture the current location coordinates at any time and store them. The client awards authorization to an outsider. The outsider can gain admittance to area information on the worker by JSON Web Token (JWT). Protection is giving cover to clients, access control, and secure information stockpiling. Encryption guarantees the security of the location area on the remote server using the Rivest Shamir Adleman (RSA) algorithm. This paper introduced two utilizations of cell phones (tokens, and location). The principal application can give area inf

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 10 2023
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
Enhancement the Educational Technology by Using 5G Networks
...Show More Authors

With the spread of global markets for modern technical education and the diversity of programs for the requirements of the local and global market for information and communication technology, the universities began to race among themselves to earn their academic reputation. In addition, they want to enhance their technological development by developing IMT systems with integrated technology as the security and fastest response with the speed of providing the required service and sure information and linking it The network and using social networking programs with wireless networks which in turn is a driver of the emerging economies of technical education. All of these facilities opened the way to expand the number of students and s

... Show More
View Publication
Scopus (27)
Crossref (8)
Scopus Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Topological Indices Polynomials of Domination David Derived Networks
...Show More Authors

The chemical properties of chemical compounds and their molecular structures are intimately connected. Topological indices are numerical values associated with chemical molecular graphs that help in understanding the physicochemical properties, chemical reactivity and biological activity of a chemical compound. This study obtains some topological properties of second and third dominating David derived (DDD) networks and computes several K Banhatti polynomial of second and third type of DDD.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
Modeling Social Networks using Data Mining Approaches-Review
...Show More Authors

     Getting knowledge from raw data has delivered beneficial information in several domains. The prevalent utilizing of social media produced extraordinary quantities of social information. Simply, social media delivers an available podium for employers for sharing information. Data Mining has ability to present applicable designs that can be useful for employers, commercial, and customers. Data of social media are strident, massive, formless, and dynamic in the natural case, so modern encounters grow. Investigation methods of data mining utilized via social networks is the purpose of the study, accepting investigation plans on the basis of criteria, and by selecting a number of papers to serve as the foundation for this arti

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref