1,912 research outputs found

    Cooperative Detection and Network Coding in Wireless Networks

    Get PDF
    In cooperative communication systems, multiple terminals in wireless networks share their antennas and resources for information exchange and processing. Recently, cooperative communications have been shown to achieve significant performance improvements in terms of transmission reliability, coverage area extension, and network throughput, with respect to existing classical communication systems. This dissertation is focused on two important applications of cooperative communications, namely: (i) cooperative distributed detection in wireless sensor networks, and (ii) many-to-many communications via cooperative space-time network coding. The first application of cooperative communications presented in this dissertation is concerned with the analysis and modeling of the deployment of cooperative relay nodes in wireless sensor networks. Particularly, in dense wireless sensor networks, sensor nodes continuously observe and collect measurements of a physical phenomenon. Such observations can be highly correlated, depending on the spatial separation between the sensor nodes as well as how the physical properties of the phenomenon are evolving over time. This unique characteristic of wireless sensor networks can be effectively exploited with cooperative communications and relays deployment such that the distributed detection performance is significantly improved as well as the energy efficiency. In particular, this dissertation studies the Amplify-and-Forward (AF) relays deployment as a function of the correlation of the observations and analyzes the achievable spatial diversity gains as compared with the classical wireless sensor networks. Moreover, it is demonstrated that the gains of cooperation can be further leveraged to alleviate bandwidth utilization inefficiencies in current sensor networks. Specifically, the deployment of cognitive AF cooperative relays to exploit empty/under-utilized time-slots and the resulting energy savings are studied, quantified and compared. The multiple terminal communication and information exchange form the second application of cooperative communications in this dissertation. Specifically, the novel concept of Space-Time-Network Coding (STNC) that is concerned with formulation of the many-to-many cooperative communications over Decode-and-Forward (DF) nodes is studied and analyzed. Moreover, the exact theoretical analysis as well as upper-bounds on the network symbol error rate performance are derived. In addition, the tradeoff between the number of communicating nodes and the timing synchronization errors is analyzed and provided as a network design guideline. With STNC, it is illustrated that cooperative diversity gains are fully exploited per node and significant performance improvements are achieved. It is concluded that the STNC scheme serves as a potential many-to-many cooperative communications scheme and that its scope goes much further beyond the generic source-relay-destination communications

    Application of the microscopic method in cutaneous leishmania diagnosis

    Get PDF
    Introduction: Cutaneous leishmania is spreading fast. This study aims at developing the microscopic method to achieve a full detection of all positive cases of leishmania.Methods: 50 human cases have been studied by applying microscopic smears stained with Wright stain. Microscopic photos were taken for the presumed unfamiliar figures.Results: Mononuclear cells with tails are present at a rate of (98%). They are associated with Leishman Donovan (LD) bodies in 50% of the cases. The polygonal figures and the spherical forms are present at the same rate (60%) and are associated with LD bodies in 24% of the cases. The small promastigote like forms are seen at a rate of (76%) and are associated with LD bodies in 26% of the cases. The giant promastigotes like forms are present in (80% of the cases) and are associated with LD bodies in 28% of the cases. Candle flame forms are present in (40% of the cases) and are associated with the LD bodies in 21% of the cases.Discussion: It is applicable to use those discovered figures in diagnosing cutaneous leishmania

    Preparation of gold, silver and copper nanostructured surfaces by application of a square wave potential regime

    Get PDF
    This paper presents a novel simple approach for preparation of gold, silver and copper nanostructured electrodes on a tantalum substrate by application of a square wave potential regime. The potential regime comprises a square wave whose lower potential limit lies within the potential zone of spontaneous electrodeposition.The identity of the formed structures was verified by EDX and voltammetry, while the size, shape and uniformity of distribution of the particles were traced by scanning electron microscopy. The resulting structures were found to depend on the square wave parameters (frequency, amplitude and position of the center of the square wave). The optimized conditions for production of nanostructured electrodes were a 100 Hz frequency, about a 60 s period of application of the square wave, and 10-3 M concentration of the metal ions. In contrast, longer deposition times and higher ion concentrations were found to lead to formation of 3-dimentional microstructures

    Saudi-Yemeni Territorial Sovereignty Disputes Over 'Asir, Jizan, Najran and the Rub' Al-Khali Desert Frontier : Legal Analysis of Some Aspects of Former Claims and the Final Settlement Under the 2000 Treaty of Jeddah

    Get PDF
    This thesis is concerned with the former disputes between Saudi Arabia and Yemen over title to the territories of' Asir, Jizan, Najran and the Rub' Al-Khali Desert frontier. Although the disputes were settled by the 2000 Treaty of Jeddah, it was possible right until the conclusion of that agreement that one of the disputing states could have submitted the disputes to arbitration, in which case the legal claims made by each state would have been highly significant. After examining the political and historical background of the disputed territories, the thesis examines three legal phases of the disputes. The first phase of the analysis is to identify the nature of claims: were they title or boundary claims or a combination of the two. The analysis shows that the two states asserted claims of both a title and a boundary nature, although the focus of this thesis is primarily on the title claims. It appears from the analysis that the title claims fall into two categories: claims related to international treaties and claims based on title acquisition modes. The second legal phase of the analysis will therefore concentrate on claims related to the two treaties that were pertinent to the disputes: the 1914 Anglo-Turkish Convention and the 1934 Treaty of Taif. The first treaty arguably delimited a boundary line, the 'Violet Line', located in the Rub' Al-Khali Desert. However, this purported delimitation was the subject of a series of claims and counter-claims between Saudi Arabia and Britain from 1934, until southern Yemen's independence in 1967, which put into doubt the continuing validity of the delimitation. This phase of the analysis considers arguments of Saudi succession to the treaty and the validity of the conclusion of the 1914 Convention by the Ottoman Empire. The second relevant treaty was the 1934 Treaty of Taif which was concluded by Saudi Arabia and northern Yemen following a short war, the two states having failed to settle title claims to 'Asir, Jizan and Najran through negotiations. Under the 1934 Treaty, Yemen renounced former title claims to these provinces, which she had formerly raised during the 1927-1934 negotiations. She also agreed with Saudi Arabia on a boundary line. However, from the mid-late 1970s, Yemen resumed its former title claims on various grounds, including the invalidity or termination of the 1934 Treaty. These claims will also be considered in the second phase of the analysis. The third phase of the analysis considers various arguments based on title acquisition/loss modes recognised by international law, such as cession, conquest, and prescription. It seeks to determine which of the two states had stronger claims to title to the disputed territories. Finally, the settlement in the 2000 Treaty of Jeddah is examined and it is asked to what extent the two states respected or ignored their former legal claims in the political settlement. It will also discuss any problems arising from the application of the 2000 Treaty

    Hybrid intelligent approach for network intrusion detection

    Get PDF
    In recent years, computer networks are broadly used, and they have become very complicated. A lot of sensitive information passes through various kinds of computer devices, ranging from minicomputers to servers and mobile devices. These occurring changes have led to draw the conclusion that the number of attacks on important information over the network systems is increasing with every year. Intrusion is the main threat to the network. It is defined as a series of activities aimed for exposing the security of network systems in terms of confidentiality, integrity and availability, as a result; intrusion detection is extremely important as a part of the defense. Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. The aim of this study is to reduce the rate of false alarm and also to improve the detection rate, comparing with the existing intrusion detection approaches. In the present study, NSL-KDD intrusion dataset has been used for training and testing the proposed approach. In order to improve classification performance, some steps have been taken beforehand. The first one is about unifying the types and filtering the dataset by data transformation. Then, a features selection algorithm is applied to remove irrelevant and noisy features for the purpose of intrusion. Feature selection has decreased the features from 41 to 21 features for intrusion detection and later normalization method is employed to perform and reduce the differences among the data. Clustering is the last step of processing before classification has been performed, using k-means algorithm. Under the purpose of classification, support vector machine have been used. After training and testing the proposed hybrid intelligent approach, the results of performance evaluation have shown that the proposed network intrusion detection has achieved high accuracy and low false detection rate. The accuracy is 96.025 percent and the false alarm is 3.715 percent

    The Effect of Peri-Radial Injection of Papaverine Versus Nitroglycerine on Radial Artery Diameter Prior to Cannulation

    Get PDF
    Objective:The present study aimed to compare the effect of periradial injection of Papaverine versus Nitroglycerine on radial artery diameter prior to cannulation in cardiac surgery patients. We hoped that periradial injection will facilitate the radial artery cannulation and decrease its spasm. Design:This is a prospective randomized controlled trial that included ninety patients scheduled for elective cardiac surgery. Interventions:Patients were randomly assigned into one of three groups: One group received a peri-radial subcutaneous injection of Papaverine and Lignocaine 2% (30 participants); the second group received a peri-radial subcutaneous injection of Nitroglycerine and Lignocaine 2% (30 participants) and a control group that received a peri-radial subcutaneous injection of Lignocaine 2% (30 participants). Measurements and Main Results:The radial artery diameter was measured by ultrasound before the injection and 20 minutes following injection, and the radial pulse palpability score was measured on a score of 1 (being weak) to 3 (being strongly palpable) before the injection and 20 minutes after.We observed a significant increase in radial artery diameter after injection of Papaverine (p< 0.001) and Nitroglycerine (p< 0.001), compared to baseline values, while there was no significant change in the control group. The changes in the Papaverine group were significantly higher (p= 0.003) than that observed in the Nitroglycerine group.The palpatory score of the radial artery was significantly higher in the Papaverine group than the Nitroglycerine group and both are significantly higher than the control group. Conclusions: Papaverine achieved significant increases in radial artery diameter and palpability score

    E-recruitment Adoption Strategy in the Universities of Saudi Arabia

    Get PDF
    This study focused on the identification of the E-recruitment strategy of the educational organizations in the Saudi Arabia. This study discusses the growth analysis of the educational industry in the Saudi Arabia and identifying the most plausible reasons for the use of the e–recruitment strategy. This study used the TAM (total acceptance model) which is the most significant model to measure technology acceptance. The results suggested that the system development should integrate by: finding the right technique in this technology to entice them in the initial stage of recruitment process; and finding the accurate system to auto- counterpart the candidates’ knowledge, skill, and capabilities with the job requirements in the preliminary stage of selection process possibly by electronic sifting.

    Fast Diffusion Limit for Reaction-Diffusion Systems with Stochastic Neumann Boundary Conditions

    Get PDF
    We consider a class of reaction-diffusion equations with a stochastic perturbation on the boundary. We show that in the limit of fast diffusion, one can rigorously approximate solutions of the system of PDEs with stochastic Neumann boundary conditions by the solution of a suitable stochastic/deterministic differential equation for the average concentration that involves reactions only. An interesting effect occurs, if the noise on the boundary does not change the averaging concentration, but is sufficiently large. Then surprising additional effective reaction terms appear. We focus on systems with polynomial nonlinearities only and give applications to the two dimensional nonlinear heat equation and the cubic auto-catalytic reaction between two chemicals

    Applying Agile Software Engineering On Medical Ubiquitous Computing (MUC)

    Get PDF
    Nowadays, people are involved in using computation capabilities to meet their daily life needs although most of the time they may be unaware as to how this actually happens. Ubiquities Computing is considered the future trend for providing unlimited computing capabilities that handle every service in human life. One of the most crucial implementation of Ubiquities Computing is in Medical and Hospital Service. This is due to their great importance in saving people's lives. The huge amount of data and information delivered by MUC systems draw the attention to the necessity of having a new and modern software engineering methodology; Agile Software engineering methodology is highly considered in the matter. In this paper, we present an implementation of applying agile SWE methodology on MUC System, research related issues are also discussed
    • …
    corecore