In this paper, we characterize the percolation condition for a continuum secondary cognitive radio network under the SINR model. We show that the well-established condition for continuum percolation does not hold true in the SINR regime. Thus, we find the condition under which a cognitive radio network percolates. We argue that due to the SINR requirements of the secondaries along with the interference tolerance of the primaries, not all the deployed secondary nodes necessarily contribute towards the percolation process- even though they might participate in the communication process. We model the invisibility of such nodes using the concept of Poisson thinning, both in the presence and absence of primaries. Invisibility occurs due to nodes that i) cannot decode transmissions except from their nearest neighbors, ii) are always interfered, and iii) belong to isolated components. We find the thinning probability in terms of primary and secondary densities, communication radii, and interference cancellation coefficient. Further, we show how the effective coverage radius shrinks which also adds to the thinning. Theoretical findings are validated through simulations.
The chemical properties of chemical compounds and their molecular structures are intimately connected. Topological indices are numerical values associated with chemical molecular graphs that help in understanding the physicochemical properties, chemical reactivity and biological activity of a chemical compound. This study obtains some topological properties of second and third dominating David derived (DDD) networks and computes several K Banhatti polynomial of second and third type of DDD.
In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show MoreWith the spread of global markets for modern technical education and the diversity of programs for the requirements of the local and global market for information and communication technology, the universities began to race among themselves to earn their academic reputation. In addition, they want to enhance their technological development by developing IMT systems with integrated technology as the security and fastest response with the speed of providing the required service and sure information and linking it The network and using social networking programs with wireless networks which in turn is a driver of the emerging economies of technical education. All of these facilities opened the way to expand the number of students and s
... Show MoreThe efficiency evaluation of the railway lines performance is done through a set of indicators and criteria, the most important are transport density, the productivity of enrollee, passenger vehicle production, the productivity of freight wagon, and the productivity of locomotives. This study includes an attempt to calculate the most important of these indicators which transport density index from productivity during the four indicators, using artificial neural network technology. Two neural networks software are used in this study, (Simulnet) and (Neuframe), the results of second program has been adopted. Training results and test to the neural network data used in the study, which are obtained from the international in
... Show MoreCommunity detection is useful for better understanding the structure of complex networks. It aids in the extraction of the required information from such networks and has a vital role in different fields that range from healthcare to regional geography, economics, human interactions, and mobility. The method for detecting the structure of communities involves the partitioning of complex networks into groups of nodes, with extensive connections within community and sparse connections with other communities. In the literature, two main measures, namely the Modularity (Q) and Normalized Mutual Information (NMI) have been used for evaluating the validation and quality of the detected community structures. Although many optimization algo
... Show MoreThis paper aims to add to the growing body of cognitive translation studies that deal with the translation of emotions and the factors of evaluating the translation process-oriented. Cognitive appraisal is one of the tokens that includes three paradigms of assessing the performance of translation, it can be addressed from the perspective of emotions, intuitions, and individual styles of the SL and the method of transfer into TL. The study hypothesized that translators create a similar emotional charge due to their mental capability to build the same emotional effect in the TL audience. The study also proposed that the applicability of cognitive appraisal is a valuable method of evaluating the translation process, as pertinent to TPR. The
... Show MoreAbstract:
In its theoretical farm, the research adobet the subject of human resource management strategies and the cognitive skills. It comes as result of the rapid development which considers it human resource. as main axis in organization , the research in includes ,connective analysis , between human resource management strategies and cognitive skills which is considers one of the new concept that should be studied widly so that the organization can be able recognize it as concept and type and its importance for people in the organization.The study method was descriptive and analytics , it identified collation of hypothesis which were by statist too
... Show MoreThe study aims to identify the cognitive bias and the level of emotional thinking among university students, besides, identifying the significant differences between male and female students regarding those two variables, and determine if there is a correlation between cognitive bias and emotional thinking. To this end, two scales were adopted to collect needed data: cognitive bias scale designed by (Al-any, 2015), composed of (14) items, and emotional thinking scale designed by (Abdu Allah, 2017), consisted of (27) items. These two scales were administered to (140) students composed the study sample. They were chosen from four different colleges at Al-mustansiriyah University for the academic year (2017-1018). The findings revealed that
... Show MoreThis study is an attempt to investigate the conceptual metaphor of UP and DOWN commonly used in Iraqi community. Some of the metaphorical expressions in Iraqi colloquial Arabicarewidely used by Iraqi speakers in everyday language. Ithas been analyzed by following the cognitive theory of metaphor (Lakoff& Johnson,1980).The study indicates that the Iraqi speakerexperiences more of the metaphorical expressions of UP and DOWN to referto many of the abstract concepts that shape his/her impression of everyday life situations.
The present paper is a qualitative descriptive study. It aims to examine the macro-cultural schemata addressing the concept of violence against women in Iraq from a cognitive linguistic point of view. To meet this objective, a number of Iraqi social caricatures have been selected from two popular and active Iraqi caricaturists, Odeh Al-Fahdawi and Nasser Ibrahim. The selection and the analysis of data have been achieved following the validity and reliability procedures and the ethical considerations. To meet this objective, Sharifian’s Model (2011) of Cultural Schemata has been adopted in data analysis. The study has concluded that the macro-cultural schemata regarding the concept of violence in the selected panels reveals that violenc
... Show More