Cognitive radios have the potential to greatly improve spectral efficiency in wireless networks. Cognitive radios are considered lower priority or secondary users of spectrum allocated to a primary user. Their fundamental requirement is to avoid interference to potential primary users in their vicinity. Spectrum sensing has been identified as a key enabling functionality to ensure that cognitive radios would not interfere with primary users, by reliably detecting primary user signals. In addition, reliable sensing creates spectrum opportunities for capacity increase of cognitive networks. One of the key challenges in spectrum sensing is the robust detection of primary signals in highly negative signal-to-noise regimes (SNR).In this paper , we present the system design approach to meet this challenge with technique , The design space is diverse as it involves various types of primary user signals, We analysis of signal processing approaches and identify the regimes where these techniques are applicable. The goal of this paper is to present a practical system design view of spectrum sensing functionality.
Copper Telluride Thin films of thickness 700nm and 900nm, prepared thin films using thermal evaporation on cleaned Si substrates kept at 300K under the vacuum about (4x10-5 ) mbar. The XRD analysis and (AFM) measurements use to study structure properties. The sensitivity (S) of the fabricated sensors to NO2 and H2 was measured at room temperature. The experimental relationship between S and thickness of the sensitive film was investigated, and higher S values were recorded for thicker sensors. Results showed that the best sensitivity was attributed to the Cu2Te film of 900 nm thickness at the H2 gas.
The aim of this paper is to study the Zariski topology of a commutative KU-algebra. Firstly, we introduce new concepts of a KU-algebra, such as KU-lattice, involutory ideal and prime ideal and investigate some basic properties of these concepts. Secondly, the notion of the topology spectrum of a commutative KU-algebra is studied and several properties of this topology are provided. Also, we study the continuous map of this topological space.
The problem of rapid population growth is one of the main problems effecting countries of the world the reason for this the growth in different environment areas of life commercial, industrial, social, food and educational. Therefore, this study was conducted on the amount of potable water consumed using two models of the two satellite and aerial images of the Kadhimiya District-block 427 and Al-Shu,laa district-block 450 in Baghdad city for available years in the Secretariat of Baghdad (2005, 2011,2013,2015). Through the characteristics of geographic information systems, which revealed the spatial patterns of urban creep by determining the role and buildings to be created, which appear in the picture for the
... Show MoreIn this study the role of remote sensing and geographic information systems in the planning of some Iraqi cities, including the city of Aziziyah in Kut / Wasit Governorate, was considered. Certain appropriate models (sprawling growth patterns) have been adopted to plan this city, and tables and a future map have been prepared to arrange this city. Land uses for public services will be proposed for adopted case(Aziziyah in Kut / Wasit Governorate). This paper describes a specific application of GIS functionalities for spatial planning analysis, examines the breadth of GIS and attempts to address the analytical part’s limitations in planning studies. The study concluded, through high-resolution visuals, to the possibility of determining th
... Show MoreThe present study aimed at identifying the effectiveness of Macaton method in improving some sensory and cognitive skills in autistic children. In order to achieve the aims of the study, the researcher used the experimental method. The present study sample was (10) children whose ages ranged between (7-10) years and were diagnosed medically with autism disorder. The researcher randomly selected the sample and divided it into two groups: the first group consisted of (5) children representing the experimental group, and (5) children representing the control group after extracting the equivalence between the two groups in terms of age, intelligence, economic and social level and the degree of communication. The program was implemented for t
... Show MoreIn this paper, we calculate and measure the SNR theoretically and experimental for digital full duplex optical communication systems for different ranges in free space, the system consists of transmitter and receiver in each side. The semiconductor laser (pointer) was used as a carrier wave in free space with the specification is 5mW power and 650nm wavelength. The type of optical detector was used a PIN with area 1mm2 and responsively 0.4A/W for this wavelength. The results show a high quality optical communication system for different range from (300-1300)m with different bit rat (60-140)kbit/sec is achieved with best values of the signal to noise ratio (SNR).
Flexible joint robot (FJR) manipulators can offer many attractive features over rigid manipulators, including light weight, safe operation, and high power efficiency. However, the tracking control of the FJR is challenging due to its inherent problems, such as underactuation, coupling, nonlinearities, uncertainties, and unknown external disturbances. In this article, a terminal sliding mode control (TSMC) is proposed for the FJR system to guarantee the finite-time convergence of the systems output, and to achieve the total robustness against the lumped disturbance and estimation error. By using two coordinate transformations, the FJR dynamics is turned into a canonical form. A cascaded finite-time sliding mode observer (CFTSMO) is construct
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show More