Cognitive radios have the potential to greatly improve spectral efficiency in wireless networks. Cognitive radios are considered lower priority or secondary users of spectrum allocated to a primary user. Their fundamental requirement is to avoid interference to potential primary users in their vicinity. Spectrum sensing has been identified as a key enabling functionality to ensure that cognitive radios would not interfere with primary users, by reliably detecting primary user signals. In addition, reliable sensing creates spectrum opportunities for capacity increase of cognitive networks. One of the key challenges in spectrum sensing is the robust detection of primary signals in highly negative signal-to-noise regimes (SNR).In this paper , we present the system design approach to meet this challenge with technique , The design space is diverse as it involves various types of primary user signals, We analysis of signal processing approaches and identify the regimes where these techniques are applicable. The goal of this paper is to present a practical system design view of spectrum sensing functionality.
Background: Complete denture wearers show lower levels of bite force than dentate subjects. This has a significant influence on their chewing efficiency. In this study an attempt was made to investigate the effect of the impression technique on the maximum bite force in complete denture wearers. Materials and methods: The patients selected for this research were 12 edentulous patients. Three different techniques for registering the final impression were made; the mucostatic, mucofunctional, and the selective pressure impression technique. Two sets of upper and lower denture bases and one set of upper and lower dentures were constructed for each subject. Intraoral and extraoral instruments and devices, as well as a computer program were used
... Show MoreObjective: To evaluate nurses' practices concerning isolation techniques for Adult Leukemic Patients (ALP).
Methodology: A descriptive study was carried out at the isolation rooms at leukemic wards in Baghdad Teaching
Hospitals, starting from Jan. 27th 2008 up to the 27th of Apr. 2008. To achieve the objectives of study, a non-probability
"purposive" sample of (50) nurse was selected out of four Teaching Hospitals in Baghdad city were selected according
to the criteria of the study sample.
The study instrument consisted of two major parts. It is based on the review of literature. First is concerned with
demographic data for nurses; and the second part is observational tool (checklist) is composed of (83) item. The conte
The effective application of the method of measuring and evaluating performance according to the Balanced Scorecard the need for an information system a comprehensive and integrated for internal and external environment, Which requires the need to develop accounting information system in general and cost management information systems to suit the particular requirements of the environment in terms of the development of modern methods of measurement to include the use of some methods that have proven effective in measuring and evaluating performance.
The research problem in need of management to develop methods of measuring and evaluating performance through the use of both financial measures and non
... Show MoreBiomedical signal such as ECG is extremely important in the diagnosis of patients and is commonly recorded with a noise. Many different kinds of noise exist in biomedical environment such as Power Line Interference Noise (PLIN). Adaptive filtering is selected to contend with these defects, the adaptive filters can adjust the filter coefficient with the given filter order. The objectives of this paper are: first an application of the Least Mean Square (LMS) algorithm, Second is an application of the Recursive Least Square (RLS) algorithm to remove the PLIN. The LMS and RLS algorithms of the adaptive filter were proposed to adapt the filter order and the filter coefficients simultaneously, the performance of existing LMS
... Show MoreThis study reported the investigation of the Radio Frequency (RF) signal propagation of Global System for Mobile Communications (GSM) coverage in Emmanuel Alayande College of Education (EACOED), Oyo, Oyo State, Nigeria. The study aims at amplifying the quality of service and augment end users' sensitivity of the wireless services operation. The drive test method is adopted with estimation of coverage level and received signal strength. The Network Cell Info Lite application installed in three INFINIX GSM mobile phones was employed to take the measurement of the signal strength received from the transmitting stations of different mobile networks. The results of the study revealed that MTN has the maximum signal strength with a mean value
... Show MoreThis study aimed to investigate the feasibility of treatment actual potato chips processing wastewater in a continuously operated dual chambers microbial fuel cell (MFC) inoculated with anaerobic sludge. The results demonstrated significant removal of COD and suspended solids of more than 99% associated with relatively high generation of current and power densities of 612.5 mW/m3 and 1750 mA/m3, respectively at 100 Ω external resistance.
Optical Mark Recognition (OMR) is the technology of electronically extracting intended data from marked fields, such as squareand bubbles fields, on printed forms. OMR technology is particularly useful for applications in which large numbers of hand-filled forms need to be processed quickly and with a great degree of accuracy. The technique is particularly popular with schools and universities for the reading in of multiple choice exam papers. This paper proposed OMRbased on Modify Multi-Connect Architecture (MMCA) associative memory, its work in two phases: training phase and recognition phase. The proposed method was also able to detect more than one or no selected choice. Among 800 test samples with 8 types of grid answer sheets and tota
... Show MoreAbstract
Although the rapid development in reverse engineering techniques, 3D laser scanners can be considered the modern technology used to digitize the 3D objects, but some troubles may be associate this process due to the environmental noises and limitation of the used scanners. So, in the present paper a data pre-processing algorithm has been proposed to obtain the necessary geometric features and mathematical representation of scanned object from its point cloud which obtained using 3D laser scanner (Matter and Form) through isolating the noised points. The proposed algorithm based on continuous calculations of chord angle between each adjacent pair of points in point cloud. A MATLAB program has been built t
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreThe research presents the reliability. It is defined as the probability of accomplishing any part of the system within a specified time and under the same circumstances. On the theoretical side, the reliability, the reliability function, and the cumulative function of failure are studied within the one-parameter Raleigh distribution. This research aims to discover many factors that are missed the reliability evaluation which causes constant interruptions of the machines in addition to the problems of data. The problem of the research is that there are many methods for estimating the reliability function but no one has suitable qualifications for most of these methods in the data such