In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper's CSI at the BS.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThe activation energy and optical band gap of different regions (p-type) polysilicon have been measured. Both microscopic studies and current-voltage characteristics of diodes prepared on different surface regions were carried out. Comparison of diodes parameters and microscopic studies indicate that the type of angles between boundaries has a significant effect on diodes parameters while the boundary lengths per unit area has less effect. The mechanism of Al-interaction with grain boundaries and their intersecting points at different temperature were also studies. The X-ray fluorescence spectrometry has been used for detection of diffused A1%.
Academia Open Vol 8 No 2 (2023): December DOI: 10.21070/acopen.8.2023.8087 . Article type: (Medicine)Impact of COVID-19 on Dental Students' Psychological Health Maryam Hameed Alwan, [email protected], (1) Department of Oral Diagnosis, College of Dentistry, Baghdad University, Iraq, Iraq (1) Corresponding author Abstract This study investigates the psychological impact of the COVID-19 pandemic on dental students at Baghdad University College of Dentistry. Conducted between December 2021 and January 2022, this cross-sectional survey aligns with ethical guidelines and the Helsinki Declaration. The study utilized Cochran's equation to determine a sample size of at least 400, ensuring a 95% confidence level with a 5% margin of e
... Show MoreAbstract : This research is a field study of international cities that hosted various events of which (Sports, Exhibitions, Scientific, Cultural) and other events, these positive impacts on the city driven by such hosts were identified. The research goal was to support hosting events to improve the hostess city and to draw future plans for further developments and to invest event’s hosting to strengthen the city’s value according to a strategic vision that looks for the future the most important conclusions are Entering events hosting is a part of urban development strategies and The most important recommendations are coordination between hosting event activities and its facilities with the infrastructure structure of the host city, its
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Drug overdose and poisoning are common clinical problems and could occur with Diphenhydramine hydrochloride (DFH) (one of anti histaminic drug ). It therefore important to study the adsorption of the DFH on pharmaceutical adsorbents which could serve as possible antidotes for the emergency treatment of DFH overdose or poisoning when they occur. The rate and extent of adsorption of DFH on some pharmaceutical adsorbents, bauxite were investigated spectra photometrically also the effect temperature, pH, presence of sucrose as additive have been studied as well, adsorbent's weight and partical size.The equilibrium adsorption contact times were determined for clay surface. Adsorption isotherms have been analyzed by the freundlich model. The appa
... Show MoreMilling Machining is a widely accepted nontraditional machining technique used to produce parts with complex shapes and configurations. The material is removed in two stages roughing and finishing, the flat end cutter removed the unwanted part of material, then finished by end mill cutter. In milling technique, the role of machining factors such as cutting depth, spindle speed and feed has been studied using Taguchi technique to find its effectiveness on surface roughness. Practical procedure is done by Taguchi Standard matrix. CNC milling is the most conventional process which is used for removing of material from workpiece to perform the needed shapes. The results and relations indicate that the rate of feed is v
... Show More