In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper's CSI at the BS.
Abstract:
The six Arab Gulf states (Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, UAE) play a vital role, especially with its geographical location and natural resources (oil and gas) as well as other cultural and civilizational elements, in achieving global economic balance and more specifically global energy security, naturally because of these countries have a comparative advantage in the field of fossil energy (oil and gas), thus this sector becomes more attractive for local and international investments alike. Being the energy sector a leader sector in the economic development process, and the basic factor to achieve savings and financial surpluses in thes
... Show MoreThe aim of this study was to evaluate in-vitro activity of Cefamandol and Ceftazidime, in combination with potassium clavulanate against 10 uropathogenic E.coli isolated from patients with chronic complicated urinary tract infections (UTIs), these isolates were identified by the Api identification systems.The antimicrobial susceptibility tests were determined by Kirby-Bauer method and the minimum inhibitory concentrations of Cefamandol and Ceftazidime, were determined, by tube method. These isolates were resistant to Ampicillin (Amp), Amoxicillin (Amo), Carbenicillin (Cb), Ticarcillin (Tic), Amoxicillin\ Potassium Clavulanate {Augmentin}, (Amo\CA), Ticarcillin\ Potassium Clavulanate {Timentin} (Tic\CA), Cefamandol (Cfm) and Ceftazidime (
... Show MoreBackground: Asthma is a common chronic disease in children in which the body’s airways swell, preventing the lungs from filling with air, there are many different inflammatory cells involved in asthma which can synthesize and release cytokines which are recognized to be important in chronic inflammation and play a critical role in the inflammatory response. Objectives: to assess the local effect of ICS on oral tissue by measuring Interlukine-12 level and Candida albicans colony in saliva among12 year's old asthmatic children who were collected from AL- Zahra Center Advisory for Allergy and Asthma, and compares them with non-asthmatic children of the same age and gender.Type of the study: Cross –sectional study.Methods: The total samp
... Show MoreGA Al Omran, AA Noaimi, Z Al Madfai, H Al Hamamy, Journal of the Faculty of Medicine Baghdad, 2012
Extracorporeal shock wave lithotripsy (ESWL) is considered a standard treatment for nephrolith or kidney stones measuring less than 20 mm. Anatomical, machine-related, and stone factors play pivotal roles in treatment outcomes, the latter being the leading role. This paper examined the relationship between stone density on native CT scans and ESWL treatment to remove renal stones concerning several treatments. One hundred and twenty patients (64 males and 56 females) were enrolled and completed the study from April 2019 to September 2020. Inclusion criteria were a single renal pelvis stone of 5–20 mm to be treated for the first time in adult patients with no urinary or musculoskeletal anatomical abnormalities. We assessed patients
... Show MoreIn situ gel can be defined as a polymer solution administered as a liquid and when exposed to some physiologic condition such as thepH, ionic, temperature modulation or solvent and UV induced gelation undergo to phase transition to a semisolid gel. Ketotifenfumarate belongs to the histamine H1 receptor antagonists, and Ketotifen fumarate is used in the treatment of allergic conditions likeconjunctivitis and rhinitis. This work aims to study the natural polymer effects (xanthan gum,gellan gum) on the properties of pH-trigger in situ ocular gel, then compared the drug-releasing rate of optimized formula with the market ketotifen eye drop. Eightformulations (F1-F8) were prepared using different concentrations of xanthan gum, gellan gum with ca
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show More
