Due to that the Ultra Wide Band (UWB) technology has some attractive features like robustness to multipath fading, high data rate, low cost and low power consumption, it is widely use to implement cognitive radio network. Intuitively, one of the most important tasks required for cognitive network is the spectrum sensing. A framework for implementing spectrum sensing for UWB-Cognitive Network will be presented in this paper. Since the information about primary licensed users are known to the cognitive radios then the best spectrum sensing scheme for UWB-cognitive network is the matched filter detection scheme. Simulation results verified and demonstrated the using of matched filter spectrum sensing in cognitive radio network with UWB and proved that the bit error rate for this detection scheme can be considered acceptable.
Out of the search for the truth, the reader of the Holy Qur’an should know the fate of the sorcerers whom Pharaoh threatened when they announced it as pure monotheism in front of seeing the stick as it turned into a clear serpent, when they said: We believe in the Lord of the worlds, the Lord of Moses and Aaron, and the clear promise came to cut and crucify the trunks of palm trees, and they said what they said if Being supplicants to God (May God cause us to die as Muslims), did Pharaoh actually carry out what he promised them?? So we studied that subject from this angle. Because what looms on the horizon of the Holy Qur’an is that there is no one who seeks refuge with God Almighty in times of adversity except that God Almighty has
... Show Morehe assignment model represents a mathematical model that aims at expressing an important problem facing enterprises and companies in the public and private sectors, which are characterized by ensuring their activities, in order to take the appropriate decision to get the best allocation of tasks for machines or jobs or workers on the machines that he owns in order to increase profits or reduce costs and time As this model is called multi-objective assignment because it takes into account the factors of time and cost together and hence we have two goals for the assignment problem, so it is not possible to solve by the usual methods and has been resorted to the use of multiple programming The objectives were to solve the problem of
... Show MoreThe paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.
NS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.
Cognitive stylistics is one discipline of applied linguistics that relies on the reader’s interpretation and inference of the meaning of the text depending on his background knowledge. It studies how the reader understands the text and mapping it with his real experiences (Jeffries and McIntyre,2010). The present study is a cognitive stylistic analysis of digital stories. Digital stories are short narratives made by a combination of different sorts of digital media such as pictures, audios and videos. These digital media are employed to tell stories about oneself, famous people, and important events. The analyzed stories are selected from “Daily Yahoo Stories” and are analyzed according to Lakoff (1993) approach, The analysis investig
... Show MoreCognitive radio technology is used to improve spectrum efficiency by having the cognitive radios act as secondary users to access primary frequency bands when they are not currently being used. In general conditions, cognitive secondary users are mobile nodes powered by battery and consuming power is one of the most important problem that facing cognitive networks; therefore, the power consumption is considered as a main constraint. In this paper, we study the performance of cognitive radio networks considering the sensing parameters as well as power constraint. The power constraint is integrated into the objective function named power efficiency which is a combination of the main system parameters of the cognitive network. We prove the exi
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
This research aims to use chemical reaction to determine some of beta lactam antibiotics which include cephalexin and ceftriaxone in some pharmaceuticals by formation Prussian Blue complexes and using them for the UV-Vis., determination of drugs at wavelengths range (700- 720)nm by reaction them with FeCl3 in the presence of reagent K3[Fe(CN)6] in acid media . The optimal experimental conditions for the complex formation have been studied such as volume of HCl , K3[Fe(CN)6] , FeCl3 ,temperature and reaction time .Analytical figures of merits obtained on applying the developed procedure for cephalexin and ceftriaxone resp. are Linearity,(2-10),(1-7)?g.ml-1 LOD(0.0601,0.0330) ?g.ml-1. The de
... Show MoreThis research evaluated the effect of (UV)(400-320A)Hz(320-220B)Hz on the patient with vitiligo , using it with our new combing therapy that include the oral (Psorlene ) topical , meladinine solution applied on the Vitiligiousns Lesions , In edition to the instralesnional injection in the Vitiligiousns Lesions by long acting steroid (kenacort-A ) by aprecentage of (5%) , after that we expose the patient to UV . The ruslets of this way of treatment more effective by using of the UV rays in the treatment of vitiligo , while the previous treatment that used the UV ray with or with out the psorlene , the results were not effective on controlling of the Vitiligio diseases comparing by the treatment used in this research as it stop’s the sp
... Show MoreThe sale of facial features is a new modern contractual development that resulted from the fast transformations in technology, leading to legal, and ethical obligations. As the need rises for human faces to be used in robots, especially in relation to industries that necessitate direct human interaction, like hospitality and retail, the potential of Artificial Intelligence (AI) generated hyper realistic facial images poses legal and cybersecurity challenges. This paper examines the legal terrain that has developed in the sale of real and AI generated human facial features, and specifically the risks of identity fraud, data misuse and privacy violations. Deep learning (DL) algorithms are analyzed for their ability to detect AI genera
... Show More