<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe
... Show MoreThe transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the
... Show MoreDue to the high mobility and dynamic topology of the FANET network, maintaining communication links between UAVs is a challenging task. The topology of these networks is more dynamic than traditional mobile networks, which raises challenges for the routing protocol. The existing routing protocols for these networks partly fail to detect network topology changes. Few methods have recently been proposed to overcome this problem due to the rapid changes of network topology. We try to solve this problem by designing a new dynamic routing method for a group of UAVs using Hybrid SDN technology (SDN and a distributed routing protocol) with a highly dynamic topology. Comparison of the proposed method performance and two other algorithms is simula
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreEmploying phase-change materials (PCM) is considered a very efficient and cost-effective option for addressing the mismatch between the energy supply and the demand. The high storage density, little temperature degradation, and ease of material processing register the PCM as a key candidate for the thermal energy storage system. However, the sluggish response rates during their melting and solidification processes limit their applications and consequently require the inclusion of heat transfer enhancers. This research aims to investigate the potential enhancement of circular fins on intensifying the PCM thermal response in a vertical triple-tube casing. Fin arrays of non-uniform dimensions and distinct distribution patterns were des
... Show MoreThe present study has three objectives: 1) to investigate the prevalence of complex nominals in economic discourse represented via the selected business news texts, 2) to shed some light on the most common translation errors made by second year students in the Department of Translation in rendering complex nominals into Arabic, and 3) to detect the possible causes behind such translation errors and suggest some translation tips which might sound helpful to the students of translation to find the most suitable translation equivalent. The present study is based on an empirical survey in which a selective analysis of someeconomic texts represented in business news texts is made. A corpus of 159 complex nominals was selected from seven busin
... Show MoreOne of the most frightening to children ages pre-school entry , Are those concerns about natural phenomena such as (The darkness, the sound of thunder, lightning and light, and rainfall, and storms) These natural phenomena are not familiar to the child , It may have a surprise when he/ she sees , And others intimidated , The affects of panic and fears that may lead him some psychological injury symptoms.
The fear of the dark, of the most common concerns associated with the child in his daily life , As the children's fear of the dark is reasonably fear that makes him a natural to live in the unknown , We can not identify what around him and is afraid of something collision, Or injury from somet
... Show More