Today the NOMA has exponential growth in the use of Optical Visible Light Communication (OVLC) due to good features such as high spectral efficiency, low BER, and flexibility. Moreover, it creates a huge demand for electronic devices with high-speed processing and data rates, which leads to more FPGA power consumption. Therefore; it is a big challenge for scientists and researchers today to recover this problem by reducing the FPGA power and size of the devices. The subject matter of this article is producing an algorithm model to reduce the power consumption of (Field Programmable Gate Array) FPGA used in the design of the Non-Orthogonal Multiple Access (NOMA) techniques applied in (OVLC) systems combined with a blue laser. However, The power consumption comes from Complex Digital Signal Processing (DSP) due to mathematical operations such as addition and multiplication which consume more FPGA power when compared with other parts of NOMA. The multiplication operation consumes more FPGA power than the additional operation. The article's goal is to propose low FPGA power consumption algorithms called recursive IFFT/FFT which reduce the FPGA power consumption by more than 45% compared with the model without the proposed algorithm using AMD Xilinx Kintex-7 with high-speed analogue card.
Wireless sensor networks (WSNs) are emerging in various application like military, area monitoring, health monitoring, industry monitoring and many more. The challenges of the successful WSN application are the energy consumption problem. since the small, portable batteries integrated into the sensor chips cannot be re-charged easily from an economical point of view. This work focusses on prolonging the network lifetime of WSNs by reducing and balancing energy consumption during routing process from hop number point of view. In this paper, performance simulation was done between two types of protocols LEACH that uses single hop path and MODLEACH that uses multi hop path by using Intel Care i3 CPU (2.13GHz) laptop with MATLAB (R2014a). Th
... Show MoreAbstract
For sparse system identification,recent suggested algorithms are  -norm Least Mean Square (
 -norm Least Mean Square (  -LMS), Zero-Attracting LMS (ZA-LMS), Reweighted Zero-Attracting LMS (RZA-LMS), and p-norm LMS (p-LMS) algorithms, that have modified the cost function of the conventional LMS algorithm by adding a constraint of coefficients sparsity. And so, the proposed algorithms are named
 -LMS), Zero-Attracting LMS (ZA-LMS), Reweighted Zero-Attracting LMS (RZA-LMS), and p-norm LMS (p-LMS) algorithms, that have modified the cost function of the conventional LMS algorithm by adding a constraint of coefficients sparsity. And so, the proposed algorithms are named  -ZA-LMS,
 -ZA-LMS, 
Virtual organization is similar to traditional organization in principles, but is different in the ways it operates. It requires small creation costs compared to the traditional and it uses electronic commerce as the market place and distribution channel for its products and services.The aim of this article is to applying electronic commerce for a proposed virtual organization. The tools used to build an effective web application for virtual organization to provide virtual environment to the customers to do the transaction activities online include PHP, MySQL and Apache. HTML is used for displaying forms and tables and JavaScript is used for verification in client side. Finally, connecting it to 2Checkout.com company as a third party to per
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreRecently, complementary perfect corona domination in graphs was introduced. A dominating set S of a graph G is said to be a complementary perfect corona dominating set (CPCD – set) if each vertex in is either a pendent vertex or a support vertex and has a perfect matching. The minimum cardinality of a complementary perfect corona dominating set is called the complementary perfect corona domination number and is denoted by . In this paper, our parameter hasbeen discussed for power graphs of path and cycle.
The aim of the research is to demonstrate the importance of leadership empowerment in its dimensions (knowledge, participation in decision-making, incentives, trust between the leader and subordinate, delegation of authority and communication) and its impact on enhancing the effectiveness of the company in its dimensions Represented by (achievement of objectives, quality of insurance service, adaptation to work environment and job satisfaction), by adopting the questionnaire as a main tool in collecting data from officials in the National Insurance Company, numbering (56) surveyed in job sites (section manager, division official and unit official) Their answers were analyzed using the SPSS statistical program in calculating the a
... Show MoreAbstract
The study aims to identify the extent to which the applied colleges at the University of Technology and Applied Sciences meet the comprehensive quality standards in light of the national education strategy for the 2040 Vision in the Sultanate of Oman. To do this, the researchers used the descriptive approach. They used a questionnaire as a tool for data collection that was applied to (237) administrators, academics, and support functions. The study found that the extent to which the applied colleges at the University of Technology and Applied Sciences meet the comprehensive quality standards in the light of the National Education Strategy 2040 in the Sultanate of Oman recorded a high range. The study als
... Show MoreVerbal Communication is linked with the social event no matter how different Communities in their cultures and styles of living and it's intuitions and political systems remain involved in its need . It is a dialogue , a pillar of human Communication , all Communication process conditional on the where a bouts of the shrine and the cycle of words . Semiotics is based on two principles important to Communicate : one : offer intended to report to the speaker . And the other : The recipient of the message a (know led gment of this intent . And learn to measure intent rely on two types of units ; first is the evidence for which is available for reporting the intent and the other : Signals . semiotics Communicate evidence bother as a channel
... Show More 
        