Television white spaces (TVWSs) refer to the unused part of the spectrum under the very high frequency (VHF) and ultra-high frequency (UHF) bands. TVWS are frequencies under licenced primary users (PUs) that are not being used and are available for secondary users (SUs). There are several ways of implementing TVWS in communications, one of which is the use of TVWS database (TVWSDB). The primary purpose of TVWSDB is to protect PUs from interference with SUs. There are several geolocation databases available for this purpose. However, it is unclear if those databases have the prediction feature that gives TVWSDB the capability of decreasing the number of inquiries from SUs. With this in mind, the authors present a reinforcement learning-based TVWSDB. Reinforcement learning (RL) is a machine learning technique that focuses on what has been done based on mapping situations to actions to obtain the highest reward. The learning process was conducted by trying out the actions to gain the reward instead of being told what to do. The actions may directly affect the rewards and future rewards. Based on the results, this algorithm effectively searched the most optimal channel for the SUs in query with the minimum search duration. This paper presents the advantage of using a machine learning approach in TVWSDB with an accurate and faster-searching capability for the available TVWS channels intended for SUs.
The study aimed to exposure young university students and students talk programs offered by satellite TV exposure, as it represents these programs great importance Information Public Knowledge in general And the youth in private Including Posed From Opinions And ideas About Different Issues Raised Which Charges Opinion, And that Through Application Study Survey To Sample From Students of Diyala University, the Researcher display Public Accrediting Theory To Information Which Provided Means Media To achieve Objectives And satisfy Needs And hypotheses . The Problem Search was Determined Through Study of students of Diyala University exposure Programs Talk And measured&
... Show MoreCommunication is one of the main elements of culture, it is the source of its formation and a factor of its development and spread. Communication is a 'dynamic' cultural process and is an integral part of the political, social, economic and cultural aspects of people. Therefore, mass communication means help in the course and movement of individuals and cultural communities. The relationship between media and culture according to this perspective is one of many key factors and influential forces that make it coherent and sometimes intertwined. It is a problematic relationship that leads to research and study in order to lay the right foundations in the orientation towards the audience.
Mass communication has many basic functions.
... Show MoreThis work investigates the impacts of eccentric-inclined load on ring footing performance resting on treated and untreated weak sandy soil, and due to the reduction in the footing carrying capacity due to the combinations of eccentrically-inclined load, the geogrid was used as reinforcement material. Ring radius ratio and reinforcement depth ratio parameters were investigated. Test outcomes showed that the carrying capacity of the footing decreases with the increment in the eccentric-inclined load and footing radius ratio. Furthermore, footing tilt and horizontal displacement increase with increasing the eccentricity and inclination angle, respectively. At the same time, the increment in the horizontal displacement due t
... Show MoreThe energy expectation values for Li and Li-like ions ( , and ) have been calculated and examined within the ground state and the excited state in position space. The partitioning technique of Hartree-Fock (H-F) has been used for existing wave functions.
Design system often generated relationship within the frame work of their concept of interior design a system or more can be created between design relationships within this concept in the structure of its internal space product. Through the division of all to it parts to reveal the hidden places and stages of composition and their relationship and interdependence between them. And then re- composition of all its parts, doth in the deign process at the initial stages or in the processes of treatments that are necessary after the completion of design and circulation. To be able to use other events close to the first events designed for them. In terms of idea logical in fluency and its social, economic, cultural and political dimension. As
... Show MoreThe quote of a Canadian communication scientist (Marshall McLuhan) (“The world has become an electronic village”) has become an archaic information compared to the great and rapid development of communication in the last two decades of the 20th century and what will happen later in the 21st century, to the extent that the world is called, thanks to the internet, a “Small screen” and this fact is a sign of the great progress that has been made in this field. As for the other statement of the Canadian communication scientist mentioned before “the medium itself, is the message”, it has been renewed and developed in its meaning and it’s purpose. Each new technical development in the means of communication necessarily means a me
... Show MoreThe basic concept of diversity; where two or more inputs at the receiver are used to get uncorrelated signals. The aim of this paper is an attempt to compare some possible combinations of diversity reception and MLSE detection techniques. Various diversity combining techniques can be distinguished: Equal Gain Combining (EGC), Maximal Ratio Combining (MRC), Selection Combining and Selection Switching Combining (SS).The simulation results shows that the MRC give better performance than the other types of combining (about 1 dB compare with EGC and 2.5~3 dB compare with selection and selection switching combining).
Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More