Television white spaces (TVWSs) refer to the unused part of the spectrum under the very high frequency (VHF) and ultra-high frequency (UHF) bands. TVWS are frequencies under licenced primary users (PUs) that are not being used and are available for secondary users (SUs). There are several ways of implementing TVWS in communications, one of which is the use of TVWS database (TVWSDB). The primary purpose of TVWSDB is to protect PUs from interference with SUs. There are several geolocation databases available for this purpose. However, it is unclear if those databases have the prediction feature that gives TVWSDB the capability of decreasing the number of inquiries from SUs. With this in mind, the authors present a reinforcement learning-based TVWSDB. Reinforcement learning (RL) is a machine learning technique that focuses on what has been done based on mapping situations to actions to obtain the highest reward. The learning process was conducted by trying out the actions to gain the reward instead of being told what to do. The actions may directly affect the rewards and future rewards. Based on the results, this algorithm effectively searched the most optimal channel for the SUs in query with the minimum search duration. This paper presents the advantage of using a machine learning approach in TVWSDB with an accurate and faster-searching capability for the available TVWS channels intended for SUs.
The Assurance Services Are Represented By Expressing A Clear And Independent Opinion On All Financial And Non-Financial Information, As It Is Broader Than The Services Related To Auditing Financial Statements And Expressing Opinion (Certification) And Extends Them To A Wider Range, And It Is Possible To Distinguish Between Auditing And Certification Services And Confirming That Audit Services Relate To Expressing Opinion On Financial Statements And Certification Services Related To By Expressing An Opinion On A Wide Range Of Financial Information And More Broadly Than The Financial Statements And Assurance Services That Include Expressing An Opinion On Integrated Financial And Non-Financial Information And From This Standpoint Came The I
... Show MoreAbstract:
The research seeks to explain the role of the international auditing standard (3402) in the auditor's procedures, where the importance of the research stems from the adoption of international auditing standards in the Iraqi environment, including the standard (3402) of assurance engagements that the external auditor performs by submitting reports on the design of control tools and their operational effectiveness in a service facility that provides the beneficiaries with a service. To provide useful information for service organizations The control tools are of great benefit in rationalizing decisions, and many recommen
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show Morein this article, we present a definition of k-generalized map independent of non-expansive map and give infinite families of non-expansive and k-generalized maps new iterative algorithms. Such algorithms are also studied in the Hilbert spaces as the potential to exist for asymptotic common fixed point.
Background: The prediction of changes in the mandibular third molar position and eruption is an important clinical concern because third molar retention may be beneficial for orthodontic anchorage. The aims of this study were to assess the mandibular third molar position by using medical CT scan and lateral reconstructed radiograph and evaluate gender differences. Materials and Methods: The sample of present study consisted of 39 patients (18 males and 21 females) with age range 11-15 years who were attending at Al-Suwayra General Hospital/ the Computerized Tomography department. The distance from anterior edge of ramus to distal surface of permanent mandibular second molar and mesio-distal width of developing mandibular third molar were
... Show MoreThe success of any media work in our contemporary life is based on proper planning. Television in Iraq is like any media outlet that adopts clear planning and programming in order to achieve the goals set in the news, entertainment, education. Iraq TV relies on four programming plans in one year (short term), but we often receive central instructions directly from the Minister of Information ordering to cancel the program plan and what was scheduled for broadcast to be finally replaced by alternative or emergency program associated with an incident, occasion or important news, these programs are all called (emergency programs).
In this present research we will be dealing with these programs as well as the extent of their impact o
... Show More