1,494 research outputs found

    Compressive Random Access Using A Common Overloaded Control Channel

    Full text link
    We introduce a "one shot" random access procedure where users can send a message without a priori synchronizing with the network. In this procedure a common overloaded control channel is used to jointly detect sparse user activity and sparse channel profiles. The detected information is subsequently used to demodulate the data in dedicated frequency slots. We analyze the system theoretically and provide a link between achievable rates and standard compressing sensing estimates in terms of explicit expressions and scaling laws. Finally, we support our findings with simulations in an LTE-A-like setting allowing "one shot" sparse random access of 100 users in 1ms.Comment: 6 pages, 3 figures, published at Globecom 201

    Development of an autonomous distributed multiagent monitoring system for the automatic classification of end users

    Get PDF
    The purpose of this study is to investigate the feasibility of constructing a software Multi-Agent based monitoring and classification system and utilizing it to provide an automated and accurate classification for end users developing applications in the spreadsheet domain. Resulting in, is the creation of the Multi-Agent Classification System (MACS). The Microsoft‘s .NET Windows Service based agents were utilized to develop the Monitoring Agents of MACS. These agents function autonomously to provide continuous and periodic monitoring of spreadsheet workbooks by content. .NET Windows Communication Foundation (WCF) Services technology was used together with the Service Oriented Architecture (SOA) approach for the distribution of the agents over the World Wide Web in order to satisfy the monitoring and classification of the multiple developer aspect. The Prometheus agent oriented design methodology and its accompanying Prometheus Design Tool (PDT) was employed for specifying and designing the agents of MACS, and Visual Studio.NET 2008 for creating the agency using visual C# programming language. MACS was evaluated against classification criteria from the literature with the support of using real-time data collected from a target group of excel spreadsheet developers over a network. The Monitoring Agents were configured to execute automatically, without any user intervention as windows service processes in the .NET web server application of the system. These distributed agents listen to and read the contents of excel spreadsheets development activities in terms of file and author properties, function and formulas used, and Visual Basic for Application (VBA) macro code constructs. Data gathered by the Monitoring Agents from various resources over a period of time was collected and filtered by a Database Updater Agent residing in the .NET client application of the system. This agent then transfers and stores the data in Oracle server database via Oracle stored procedures for further processing that leads to the classification of the end user developers. Oracle data mining classification algorithms: Naive Bayes, Adaptive Naive Bayes, Decision Trees, and Support Vector Machine were utilized to analyse the results from the data gathering process in order to automate the classification of excel spreadsheet developers. The accuracy of the predictions achieved by the models was compared. The results of the comparison showed that Naive Bayes classifier achieved the best results with accuracy of 0.978. Therefore, the MACS can be utilized to provide a Multi-Agent based automated classification solution to spreadsheet developers with a high degree of accuracy

    Between the Left and the Right: Jihadi Brides’ British Media Frames Post ISIS Fall

    Get PDF
    This thesis analyzes the media frames/representations of Western women who migrated to ISIS, known as “Jihadi Brides,” after the fall of ISIS in December 2017. ISIS is a terrorist group that used attractive strategies and techniques in recruiting Western women to join ISIS as Jihadi Brides, building on the promises of the perfect life within the Islamic state. It is important to understand this phenomenon especially after the fall of ISIS. Media narratives and frames help shape the public opinion and the societal actions toward different societal issues. This research is important because it analyzes the phenomenon of the Jihadi Brides as an existing problem after the fall of ISIS through the frames of the media and qualitative research through a feminist lens focused on the traumatized Western women who migrated to ISIS. Based on a media feminist analysis of two main British newspapers that represent the right and the left, this research holds a comparison of the media representations of the Jihadi Brides in The Daily Telegraph/Sunday telegraph and The Guardian. Keywords: Jihadi Brides, ISIS Women, Media Frames, British Media, Feminis

    A cross sectional study of maternal ‘near-miss’ cases in major public hospitals in Egypt, Lebanon, Palestine and Syria

    Get PDF
    The maternal near-miss approach has been increasingly used as a tool to evaluate and improve the quality of care in maternal health. We report findings from the formative stage of a World Health Organization (WHO) funded implementation research study that was undertaken to collect primary data at the facility level on the prevalence, characteristics, and management of maternal near-miss cases in four major public referral hospitals - one each in Egypt, Lebanon, Palestine and SyriaWHO Alliance grant (Implementation Research Protocol ID A65770)

    Economic Contribution of Cultural Industries: Evidence from some Selected Countries

    Get PDF
    Cultural industries have become a significant component of modern economies There is increasing attention measuring the economic contribution of these industries at national levels particularly their impact on economic variables The objective of this study is to illustrate concepts approaches methodologies related to cultural economics Moreover to shed light on measuring methods of the economic contribution of cultural industries Using descriptive analysis we examined the use of these approaches in some selected countries These countries are UK Finland France Germany Italy and Spain from Europe Canada and USA from North America Australia China and India from the Asia-pacific region South American economic organization MERCOSUR countries for the South American region South Africa and Egypt from Africa region The main results revealed the increasing realization of measuring cultural economic contributions in developed countries rather than developing countries Yet data limitation is still the main problem of measuring the economic contribution of cultural industries Furthermore for international comparison purposes there is a real need to develop new common concepts and measurements of the economic contribution of cultural industrie

    A Look-ahead Towards 6G Security (Abstract)

    Get PDF

    A framing analysis of Al-Jazeera\u27s coverage of the Palestinian Fatah-Hamas conflict.

    Get PDF
    By utilizing both framing and descriptive analysis, this study examined how an Arab media outlet, Al-Jazeera, with an increasingly global reach framed the Palestinian-Palestinian conflict. The 2006 Palestinian legislative elections and the 2007 fall-of-Gaza under the control of Hamas were two critical Palestinian events that warranted an examination of how coverage of these two periods was framed. Thirty frames were found in Al-Jazeera\u27s coverage of the two mentioned critical events. These frames were categorized into seven major sets of frames. The civil war and the politics\u27 sets of frames dominated Al-Jazeera\u27s coverage in the fall-of-Gaza period, and the elections and politics\u27 sets of frames dominated Al-Jazeera\u27s coverage in the elections\u27 period. The study tested the tone of the coverage to determine whether there was favoritism shown to Hamas. Overall, the channel\u27s presentation of the news related to Palestinian coverage was neutral with significant favoritism to Hamas especially in the fall-of-Gaza period. Another finding of this study was that Al-Jazeera\u27s coverage of both time periods was heavily episodic. Two compositional elements, camera angle and proximity of subject to viewer, were analyzed for this study, and Al-Jazeera conveyed a sense of credibility and objectivity by using images that act as records of events. Therefore, visual elements were not used as framing devices that would result in favoritism to Hamas

    Broadband Jamming Suppression at Subarray Level for Frequency Diverse Array Antenna

    Get PDF

    Secure Equality Test Technique Using Identity-Based Signcryption for Telemedicine Systems

    Get PDF
    For telemedicine, wireless body area network (WBAN) offers enormous benefits where a patient can be remotely monitored without compromising the mobility of remote treatments. With the advent of high capacity and reliable wireless networks, WBANs are used in several remote monitoring systems, limiting the COVID-19 spread. The sensitivity of telemedicine applications mandates confidentiality and privacy requirements. In this article, we propose a secure WBAN-19 telemedicine system to overcome the pervasiveness of contagious deceases utilizing a novel aggregate identity-based signcryption scheme with an equality test feature. We demonstrate a security analysis regarding indistinguishable adaptive chosen-ciphertext attack (IND-CCA2), one-way security against adaptive chosen-ciphertext attack (OW-CCA2), and unforgeability against adaptive chosen-message attack (EUF-CMA) under the random oracle model. The security analysis of the scheme is followed by complexity evaluations where the computation cost and communication overhead are measured. The evaluation demonstrates that the proposed model is efficient and applicable in telemedicine systems with high-performance capacities
    corecore