Cognitive radios have the potential to greatly improve spectral efficiency in wireless networks. Cognitive radios are considered lower priority or secondary users of spectrum allocated to a primary user. Their fundamental requirement is to avoid interference to potential primary users in their vicinity. Spectrum sensing has been identified as a key enabling functionality to ensure that cognitive radios would not interfere with primary users, by reliably detecting primary user signals. In addition, reliable sensing creates spectrum opportunities for capacity increase of cognitive networks. One of the key challenges in spectrum sensing is the robust detection of primary signals in highly negative signal-to-noise regimes (SNR).In this paper , we present the system design approach to meet this challenge with technique , The design space is diverse as it involves various types of primary user signals, We analysis of signal processing approaches and identify the regimes where these techniques are applicable. The goal of this paper is to present a practical system design view of spectrum sensing functionality.
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreDBN Rashid, Asian Quarterly: An International Journal of Contemporary Issue, 2018
The researcher highlighted in his research on an important subject that people need, which is the excuse of ignorance in Islamic law. , As the flag of light and ignorance of darkness. Then the researcher lameness of the reasons for research in this subject as it is one of the assets that should be practiced by the ruler and the judge and the mufti and the diligent and jurisprudent, but the public should identify the issues that ignore ignorance and issues that are not excused even if claimed ignorance.
Then the researcher concluded the most important results, and recommendations that he wanted to set scientific rules for students of science and Muslims in general, to follow the issues of legitimacy and learn its provisions and i
The Caputo definition of fractional derivatives introduces solution to the difficulties appears in the numerical treatment of differential equations due its consistency in differentiating constant functions. In the same time the memory and hereditary behaviors of the time fractional order derivatives (TFODE) still common in all definitions of fractional derivatives. The use of properties of companion matrices appears in reformulating multilevel schemes as generalized two level schemes is employed with the Gerschgorin disc theorems to prove stability condition. Caputo fractional derivatives with finite difference representations is considered. Moreover the effect of using the inverse operator which tr
Rock mechanical properties are critical parameters for many development techniques related to tight reservoirs, such as hydraulic fracturing design and detecting failure criteria in wellbore instability assessment. When direct measurements of mechanical properties are not available, it is helpful to find sufficient correlations to estimate these parameters. This study summarized experimentally derived correlations for estimating the shear velocity, Young's modulus, Poisson's ratio, and compressive strength. Also, a useful correlation is introduced to convert dynamic elastic properties from log data to static elastic properties. Most of the derived equations in this paper show good fitting to measured data, while some equations show scatters
... Show MoreFormation evaluation is a critical process in the petroleum industry that involves assessing the petrophysical properties and hydrocarbon potential of subsurface rock formations. This study focuses on evaluating the Mauddad Formation in the Bai Hassan oil field by analyzing data obtained from well logs and core samples. Four wells were specifically chosen for this study (BH-102, BH-16, BH-86, and BH-93). The main objectives of this study were to identify the lithology of the Mauddud Formation and estimate key petrophysical properties such as shale volume, porosity, water saturation, and permeability. The Mauddud Formation primarily consists of limestone and dolomite, with some anhydrites present. It is classified as a clean for
... Show MoreShatt Al-Hilla was considered one of the important branches of Euphrates River that supplies irrigation water to millions of dunams of planted areas. It is important to control the velocity and water level along the river to maintain the required level for easily diverting water to the branches located along the river. So, in this research, a numerical model was developed to simulate the gradually varied unsteady flow in Shatt AL-Hilla. The present study aims to solve the continuity and momentum (Saint-Venant) equations numerically to predict the hydraulic characteristics in the river using Galerkin finite element method. A computer program was designed and built using the programming language FORTRAN-77. Fifty kilometers was consid
... Show More