Due to that the Ultra Wide Band (UWB) technology has some attractive features like robustness to multipath fading, high data rate, low cost and low power consumption, it is widely use to implement cognitive radio network. Intuitively, one of the most important tasks required for cognitive network is the spectrum sensing. A framework for implementing spectrum sensing for UWB-Cognitive Network will be presented in this paper. Since the information about primary licensed users are known to the cognitive radios then the best spectrum sensing scheme for UWB-cognitive network is the matched filter detection scheme. Simulation results verified and demonstrated the using of matched filter spectrum sensing in cognitive radio network with UWB and proved that the bit error rate for this detection scheme can be considered acceptable.
Values and ideals are two basic pillars in human life, and high societies have been keen throughout their ages to adhere to and establish them so that man can distinguish good and evil, right and wrong, as they are a balance of actions that give man a higher value. Many of the followers of Abbasid literature, poetry and prose – it is noted that many imams and writers have been keen to highlight these values and make them material for their poetry and literature, courage, generosity, chastity and....All meanings of human values and there is no doubt that one of the texts abounding in this field is what was reported from the people of the house of infallibility pure (peace be upon them), including we touch it in the visit of Imam Jaafar al-
... Show MoreThe Noble Qur’an is the book of God, the Blessed and Exalted, in which is the teachings of God Almighty’s religion, which is Islam, in order for people to unite it and establish servitude to it. The individual and the society alike saw it appropriate to make my opinion alerting the seriousness of this matter, so the research was entitled (The Impact of Sins and Disobedience on the Individual and Society in the Holy Qur’an - Objective Study), knowing that we touched upon some of the effects, which we found it appropriate to mention in this research in the service of the good. Its details came in the Holy Qur’an without referring to others, noting their arrangement in the Holy Qur’an..
Background: Evaluation and measurement of primary stability could be achieved by several methods, including the resonance frequency analysis (RFA) and implant insertion torque (IT) values. The need for a sufficient primary stability, guaranteed by an adequate insertion torque and implant stability quotient values, increased its importance mainly in one stage implants or in immediate loading protocols. The aims of this study was to find if there is a correlation between the peak insertion torque (PIT) and ISQ values of implants inserted in the jaws of different bone quality which regarded as two important clinical determinant factors for prediction of implant primary stability, and to evaluate and compare whether an experienced clinician cou
... Show MoreThe traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreRecently, the theory of Complex Networks gives a modern insight into a variety of applications in our life. Complex Networks are used to form complex phenomena into graph-based models that include nodes and edges connecting them. This representation can be analyzed by using network metrics such as node degree, clustering coefficient, path length, closeness, betweenness, density, and diameter, to mention a few. The topology of the complex interconnections of power grids is considered one of the challenges that can be faced in terms of understanding and analyzing them. Therefore, some countries use Complex Networks concepts to model their power grid networks. In this work, the Iraqi Power Grid network (IPG) has been modeled, visua
... Show MoreImage Fusion Using A Convolutional Neural Network