Preferred Language
Articles
/
yRZAjIcBVTCNdQwCxlXn
Ultra Wideband Cognitive Network Objective Issues
...Show More Authors

Due to that the Ultra Wide Band (UWB) technology has some attractive features like robustness to multipath fading, high data rate, low cost and low power consumption, it is widely use to implement cognitive radio network. Intuitively, one of the most important tasks required for cognitive network is the spectrum sensing. A framework for implementing spectrum sensing for UWB-Cognitive Network will be presented in this paper. Since the information about primary licensed users are known to the cognitive radios then the best spectrum sensing scheme for UWB-cognitive network is the matched filter detection scheme. Simulation results verified and demonstrated the using of matched filter spectrum sensing in cognitive radio network with UWB and proved that the bit error rate for this detection scheme can be considered acceptable.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Dec 31 2017
Journal Name
College Of Islamic Sciences
The fate of Pharaoh's magicians in the Quran : objective study
...Show More Authors

Out of the search for the truth, the reader of the Holy Qur’an should know the fate of the sorcerers whom Pharaoh threatened when they announced it as pure monotheism in front of seeing the stick as it turned into a clear serpent, when they said: We believe in the Lord of the worlds, the Lord of Moses and Aaron, and the clear promise came to cut and crucify the trunks of palm trees, and they said what they said if Being supplicants to God (May God cause us to die as Muslims), did Pharaoh actually carry out what he promised them?? So we studied that subject from this angle. Because what looms on the horizon of the Holy Qur’an is that there is no one who seeks refuge with God Almighty in times of adversity except that God Almighty has

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 20 2018
Journal Name
Journal Of Economics And Administrative Sciences
Solve the problem of assignment by using multi-Objective programming
...Show More Authors

he assignment model represents a mathematical model that aims at expressing an important problem facing enterprises and companies in the public and private sectors, which are characterized by ensuring their activities, in order to take the appropriate decision to get the best allocation of tasks for machines or jobs or workers on the machines that he owns in order to increase profits or reduce costs and time As this model is called multi-objective assignment because it takes into account the factors of time and cost together and hence we have two goals for the assignment problem, so it is not possible to solve by the usual methods and has been resorted to the use of multiple programming The objectives were to solve the problem of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Spike neural network as a controller in SDN network
...Show More Authors

The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Network Performance Analysis Based on Network Simulator NS-2.
...Show More Authors

     NS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Al Adab
Cognitive Stylistic Analysis of Daily Yahoo Storie
...Show More Authors

Cognitive stylistics is one discipline of applied linguistics that relies on the reader’s interpretation and inference of the meaning of the text depending on his background knowledge. It studies how the reader understands the text and mapping it with his real experiences (Jeffries and McIntyre,2010). The present study is a cognitive stylistic analysis of digital stories. Digital stories are short narratives made by a combination of different sorts of digital media such as pictures, audios and videos. These digital media are employed to tell stories about oneself, famous people, and important events. The analyzed stories are selected from “Daily Yahoo Stories” and are analyzed according to Lakoff (1993) approach, The analysis investig

... Show More
Publication Date
Wed Apr 01 2009
Journal Name
2009 Ieee Wireless Communications And Networking Conference
Power Efficiency Maximization in Cognitive Radio Networks
...Show More Authors

Cognitive radio technology is used to improve spectrum efficiency by having the cognitive radios act as secondary users to access primary frequency bands when they are not currently being used. In general conditions, cognitive secondary users are mobile nodes powered by battery and consuming power is one of the most important problem that facing cognitive networks; therefore, the power consumption is considered as a main constraint. In this paper, we study the performance of cognitive radio networks considering the sensing parameters as well as power constraint. The power constraint is integrated into the objective function named power efficiency which is a combination of the main system parameters of the cognitive network. We prove the exi

... Show More
View Publication
Scopus (16)
Crossref (10)
Scopus Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
The use of ultra-violet visible spectroscopy to determination some antibiotics beta-lactam in some drugs
...Show More Authors

This research aims to use chemical reaction to determine some of beta lactam antibiotics which include cephalexin and ceftriaxone in some pharmaceuticals by formation Prussian Blue complexes and using them for the UV-Vis., determination of drugs at wavelengths range (700- 720)nm by reaction them with FeCl3 in the presence of reagent K3[Fe(CN)6] in acid media . The optimal experimental conditions for the complex formation have been studied such as volume of HCl , K3[Fe(CN)6] , FeCl3 ,temperature and reaction time .Analytical figures of merits obtained on applying the developed procedure for cephalexin and ceftriaxone resp. are Linearity,(2-10),(1-7)?g.ml-1 LOD(0.0601,0.0330) ?g.ml-1. The de

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
We study the effect of Ultra violet rays (A-B) in treatment of Vitiligo (applied Therapy)
...Show More Authors

This research evaluated the effect of (UV)(400-320A)Hz(320-220B)Hz on the patient with vitiligo , using it with our new combing therapy that include the oral (Psorlene ) topical , meladinine solution applied on the Vitiligiousns Lesions , In edition to the instralesnional injection in the Vitiligiousns Lesions by long acting steroid (kenacort-A ) by aprecentage of (5%) , after that we expose the patient to UV . The ruslets of this way of treatment more effective by using of the UV rays in the treatment of vitiligo , while the previous treatment that used the UV ray with or with out the psorlene , the results were not effective on controlling of the Vitiligio diseases comparing by the treatment used in this research as it stop’s the sp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 30 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Artificial Intelligence and Cybersecurity in Face Sale Contracts: Legal Issues and Frameworks
...Show More Authors

The sale of facial features is a new modern contractual development that resulted from the fast transformations in technology, leading to legal, and ethical obligations. As the need rises for human faces to be used in robots, especially in relation to industries that necessitate direct human interaction, like hospitality and retail, the potential of Artificial Intelligence (AI) generated hyper realistic facial images poses legal and cybersecurity challenges. This paper examines the legal terrain that has developed in the sale of real and AI generated human facial features, and specifically the risks of identity fraud, data misuse and privacy violations. Deep learning (DL) algorithms are analyzed for their ability to detect AI genera

... Show More
View Publication
Scopus (6)
Scopus Crossref